Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-29404
Vulnerability from cvelistv5
Published
2022-06-08 10:00
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache HTTP Server |
Version: unspecified < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:17:55.325Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { name: "[oss-security] 20220608 CVE-2022-29404: Apache HTTP Server: Denial of service in mod_lua r:parsebody", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/06/08/5", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, { name: "FEDORA-2022-e620fb15d5", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/", }, { name: "FEDORA-2022-b54a8dee29", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/", }, { name: "GLSA-202208-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202208-20", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache HTTP Server", vendor: "Apache Software Foundation", versions: [ { lessThanOrEqual: "2.4.53", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue", }, ], descriptions: [ { lang: "en", value: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", }, ], metrics: [ { other: { content: { other: "low", }, type: "unknown", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-770", description: "CWE-770: Allocation of Resources Without Limits or Throttling", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-14T01:06:33", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { name: "[oss-security] 20220608 CVE-2022-29404: Apache HTTP Server: Denial of service in mod_lua r:parsebody", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/06/08/5", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, { name: "FEDORA-2022-e620fb15d5", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/", }, { name: "FEDORA-2022-b54a8dee29", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/", }, { name: "GLSA-202208-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202208-20", }, ], source: { discovery: "UNKNOWN", }, timeline: [ { lang: "en", time: "2022-06-08T00:00:00", value: "released in 2.4.54", }, ], title: "Denial of service in mod_lua r:parsebody", x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2022-29404", STATE: "PUBLIC", TITLE: "Denial of service in mod_lua r:parsebody", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache HTTP Server", version: { version_data: [ { version_affected: "<=", version_value: "2.4.53", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, credit: [ { lang: "eng", value: "The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: [ { other: "low", }, ], problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-770: Allocation of Resources Without Limits or Throttling", }, ], }, ], }, references: { reference_data: [ { name: "https://httpd.apache.org/security/vulnerabilities_24.html", refsource: "MISC", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { name: "[oss-security] 20220608 CVE-2022-29404: Apache HTTP Server: Denial of service in mod_lua r:parsebody", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/06/08/5", }, { name: "https://security.netapp.com/advisory/ntap-20220624-0005/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, { name: "FEDORA-2022-e620fb15d5", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/", }, { name: "FEDORA-2022-b54a8dee29", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/", }, { name: "GLSA-202208-20", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-20", }, ], }, source: { discovery: "UNKNOWN", }, timeline: [ { lang: "en", time: "2022-06-08T00:00:00", value: "released in 2.4.54", }, ], }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2022-29404", datePublished: "2022-06-08T10:00:52", dateReserved: "2022-04-16T00:00:00", dateUpdated: "2024-08-03T06:17:55.325Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.4.53\", \"matchCriteriaId\": \"B39537A1-5A13-491A-B333-BB53FF718EA7\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FE996B1-6951-4F85-AA58-B99A379D2163\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.\"}, {\"lang\": \"es\", \"value\": \"En Apache HTTP Server 2.4.53 y anteriores, una petici\\u00f3n maliciosa a un script lua que llame a r:parsebody(0) puede causar una denegaci\\u00f3n de servicio debido a que no presenta un l\\u00edmite por defecto en el tama\\u00f1o posible de la entrada\"}]", id: "CVE-2022-29404", lastModified: "2024-11-21T06:59:01.000", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2022-06-09T17:15:09.283", references: "[{\"url\": \"http://www.openwall.com/lists/oss-security/2022/06/08/5\", \"source\": \"security@apache.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"source\": \"security@apache.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/\", \"source\": \"security@apache.org\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-20\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220624-0005/\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/06/08/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-20\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220624-0005/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "security@apache.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"security@apache.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-770\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-770\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2022-29404\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2022-06-09T17:15:09.283\",\"lastModified\":\"2024-11-21T06:59:01.000\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.\"},{\"lang\":\"es\",\"value\":\"En Apache HTTP Server 2.4.53 y anteriores, una petición maliciosa a un script lua que llame a r:parsebody(0) puede causar una denegación de servicio debido a que no presenta un límite por defecto en el tamaño posible de la entrada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.53\",\"matchCriteriaId\":\"B39537A1-5A13-491A-B333-BB53FF718EA7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/06/08/5\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-20\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220624-0005/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/06/08/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220624-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
rhsa-2022:7647
Vulnerability from csaf_redhat
Published
2022-11-08 09:35
Modified
2025-01-09 06:13
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:7647", url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7647.json", }, ], title: "Red Hat Security Advisory: httpd:2.4 security update", tracking: { current_release_date: "2025-01-09T06:13:54+00:00", generator: { date: "2025-01-09T06:13:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2022:7647", initial_release_date: "2022-11-08T09:35:12+00:00", revision_history: [ { date: "2022-11-08T09:35:12+00:00", number: "1", summary: "Initial version", }, { date: "2022-11-08T09:35:12+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-09T06:13:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd:2.4:8070020220725152258:3b9f49c4", product: { name: "httpd:2.4:8070020220725152258:3b9f49c4", product_id: "httpd:2.4:8070020220725152258:3b9f49c4", product_identification_helper: { purl: "pkg:rpmmod/redhat/httpd@2.4:8070020220725152258:3b9f49c4", }, }, }, { category: "product_version", name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product: { name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_id: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product: { name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_id: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=src", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=src", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src&epoch=1", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, product_reference: "httpd:2.4:8070020220725152258:3b9f49c4", relates_to_product_reference: "AppStream-8.7.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", }, product_reference: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", }, product_reference: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
RHSA-2022:7647
Vulnerability from csaf_redhat
Published
2022-11-08 09:35
Modified
2025-01-09 06:13
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:7647", url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7647.json", }, ], title: "Red Hat Security Advisory: httpd:2.4 security update", tracking: { current_release_date: "2025-01-09T06:13:54+00:00", generator: { date: "2025-01-09T06:13:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2022:7647", initial_release_date: "2022-11-08T09:35:12+00:00", revision_history: [ { date: "2022-11-08T09:35:12+00:00", number: "1", summary: "Initial version", }, { date: "2022-11-08T09:35:12+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-09T06:13:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd:2.4:8070020220725152258:3b9f49c4", product: { name: "httpd:2.4:8070020220725152258:3b9f49c4", product_id: "httpd:2.4:8070020220725152258:3b9f49c4", product_identification_helper: { purl: "pkg:rpmmod/redhat/httpd@2.4:8070020220725152258:3b9f49c4", }, }, }, { category: "product_version", name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product: { name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_id: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product: { name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_id: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=src", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=src", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src&epoch=1", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, product_reference: "httpd:2.4:8070020220725152258:3b9f49c4", relates_to_product_reference: "AppStream-8.7.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", }, product_reference: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", }, product_reference: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
rhsa-2022_8067
Vulnerability from csaf_redhat
Published
2022-11-15 09:58
Modified
2024-11-15 15:00
Summary
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nThe following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:8067", url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2073459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073459", }, { category: "external", summary: "2075406", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2075406", }, { category: "external", summary: "2079939", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2079939", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "2095838", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095838", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8067.json", }, ], title: "Red Hat Security Advisory: httpd security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-15T15:00:12+00:00", generator: { date: "2024-11-15T15:00:12+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:8067", initial_release_date: "2022-11-15T09:58:32+00:00", revision_history: [ { date: "2022-11-15T09:58:32+00:00", number: "1", summary: "Initial version", }, { date: "2022-11-15T09:58:32+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T15:00:12+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.src", product: { name: "httpd-0:2.4.53-7.el9.src", product_id: "httpd-0:2.4.53-7.el9.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.aarch64", product: { name: "httpd-0:2.4.53-7.el9.aarch64", product_id: "httpd-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.aarch64", product: { name: "httpd-core-0:2.4.53-7.el9.aarch64", product_id: "httpd-core-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.aarch64", product: { name: "httpd-devel-0:2.4.53-7.el9.aarch64", product_id: "httpd-devel-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.aarch64", product: { name: "httpd-tools-0:2.4.53-7.el9.aarch64", product_id: "httpd-tools-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.aarch64", product: { name: "mod_ldap-0:2.4.53-7.el9.aarch64", product_id: "mod_ldap-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.aarch64", product: { name: "mod_lua-0:2.4.53-7.el9.aarch64", product_id: "mod_lua-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product: { name: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product_id: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.aarch64", product: { name: "mod_session-0:2.4.53-7.el9.aarch64", product_id: "mod_session-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.aarch64", product: { name: "mod_ssl-1:2.4.53-7.el9.aarch64", product_id: "mod_ssl-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product: { name: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product_id: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-0:2.4.53-7.el9.ppc64le", product_id: "httpd-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-core-0:2.4.53-7.el9.ppc64le", product_id: "httpd-core-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-devel-0:2.4.53-7.el9.ppc64le", product_id: "httpd-devel-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-tools-0:2.4.53-7.el9.ppc64le", product_id: "httpd-tools-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.ppc64le", product: { name: "mod_ldap-0:2.4.53-7.el9.ppc64le", product_id: "mod_ldap-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.ppc64le", product: { name: "mod_lua-0:2.4.53-7.el9.ppc64le", product_id: "mod_lua-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product: { name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product_id: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.ppc64le", product: { name: "mod_session-0:2.4.53-7.el9.ppc64le", product_id: "mod_session-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.ppc64le", product: { name: "mod_ssl-1:2.4.53-7.el9.ppc64le", product_id: "mod_ssl-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product_id: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.x86_64", product: { name: "httpd-0:2.4.53-7.el9.x86_64", product_id: "httpd-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.x86_64", product: { name: "httpd-core-0:2.4.53-7.el9.x86_64", product_id: "httpd-core-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.x86_64", product: { name: "httpd-devel-0:2.4.53-7.el9.x86_64", product_id: "httpd-devel-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.x86_64", product: { name: "httpd-tools-0:2.4.53-7.el9.x86_64", product_id: "httpd-tools-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.x86_64", product: { name: "mod_ldap-0:2.4.53-7.el9.x86_64", product_id: "mod_ldap-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.x86_64", product: { name: "mod_lua-0:2.4.53-7.el9.x86_64", product_id: "mod_lua-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product: { name: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product_id: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.x86_64", product: { name: "mod_session-0:2.4.53-7.el9.x86_64", product_id: "mod_session-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.x86_64", product: { name: "mod_ssl-1:2.4.53-7.el9.x86_64", product_id: "mod_ssl-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product: { name: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product_id: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.s390x", product: { name: "httpd-0:2.4.53-7.el9.s390x", product_id: "httpd-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.s390x", product: { name: "httpd-core-0:2.4.53-7.el9.s390x", product_id: "httpd-core-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.s390x", product: { name: "httpd-devel-0:2.4.53-7.el9.s390x", product_id: "httpd-devel-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.s390x", product: { name: "httpd-tools-0:2.4.53-7.el9.s390x", product_id: "httpd-tools-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.s390x", product: { name: "mod_ldap-0:2.4.53-7.el9.s390x", product_id: "mod_ldap-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.s390x", product: { name: "mod_lua-0:2.4.53-7.el9.s390x", product_id: "mod_lua-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.s390x", product: { name: "mod_proxy_html-1:2.4.53-7.el9.s390x", product_id: "mod_proxy_html-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.s390x", product: { name: "mod_session-0:2.4.53-7.el9.s390x", product_id: "mod_session-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.s390x", product: { name: "mod_ssl-1:2.4.53-7.el9.s390x", product_id: "mod_ssl-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.s390x", product: { name: "httpd-debugsource-0:2.4.53-7.el9.s390x", product_id: "httpd-debugsource-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-filesystem-0:2.4.53-7.el9.noarch", product: { name: "httpd-filesystem-0:2.4.53-7.el9.noarch", product_id: "httpd-filesystem-0:2.4.53-7.el9.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.53-7.el9?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.53-7.el9.noarch", product: { name: "httpd-manual-0:2.4.53-7.el9.noarch", product_id: "httpd-manual-0:2.4.53-7.el9.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.53-7.el9?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", }, product_reference: "httpd-0:2.4.53-7.el9.src", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-core-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-core-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-core-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-core-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-devel-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-devel-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-devel-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-devel-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.53-7.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", }, product_reference: "httpd-filesystem-0:2.4.53-7.el9.noarch", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.53-7.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", }, product_reference: "httpd-manual-0:2.4.53-7.el9.noarch", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-tools-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-tools-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-tools-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-tools-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_ldap-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ldap-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", }, product_reference: "mod_ldap-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_ldap-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_lua-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_lua-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", }, product_reference: "mod_lua-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_lua-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_session-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_session-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", }, product_reference: "mod_session-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_session-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_ssl-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ssl-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", }, product_reference: "mod_ssl-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_ssl-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, ], }, vulnerabilities: [ { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
rhsa-2022_7647
Vulnerability from csaf_redhat
Published
2022-11-08 09:35
Modified
2024-11-15 15:00
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:7647", url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7647.json", }, ], title: "Red Hat Security Advisory: httpd:2.4 security update", tracking: { current_release_date: "2024-11-15T15:00:45+00:00", generator: { date: "2024-11-15T15:00:45+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:7647", initial_release_date: "2022-11-08T09:35:12+00:00", revision_history: [ { date: "2022-11-08T09:35:12+00:00", number: "1", summary: "Initial version", }, { date: "2022-11-08T09:35:12+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T15:00:45+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd:2.4:8070020220725152258:3b9f49c4", product: { name: "httpd:2.4:8070020220725152258:3b9f49c4", product_id: "httpd:2.4:8070020220725152258:3b9f49c4", product_identification_helper: { purl: "pkg:rpmmod/redhat/httpd@2.4:8070020220725152258:3b9f49c4", }, }, }, { category: "product_version", name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product: { name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_id: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product: { name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_id: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=src", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=src", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src&epoch=1", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_id: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_id: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, product_reference: "httpd:2.4:8070020220725152258:3b9f49c4", relates_to_product_reference: "AppStream-8.7.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", }, product_reference: "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", }, product_reference: "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", }, product_reference: "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", }, product_reference: "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", relates_to_product_reference: "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-08T09:35:12+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
rhsa-2022:6753
Vulnerability from csaf_redhat
Published
2022-09-29 13:33
Modified
2025-01-09 06:13
Summary
Red Hat Security Advisory: httpd24-httpd security and bug fix update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2022319)
Additional changes:
* To fix CVE-2022-29404, the default value for the "LimitRequestBody" directive in the Apache HTTP Server has been changed from 0 (unlimited) to 1 GiB.
On systems where the value of "LimitRequestBody" is not explicitly specified in an httpd configuration file, updating the httpd package sets "LimitRequestBody" to the default value of 1 GiB. As a consequence, if the total size of the HTTP request body exceeds this 1 GiB default limit, httpd returns the 413 Request Entity Too Large error code.
If the new default allowed size of an HTTP request message body is insufficient for your use case, update your httpd configuration files within the respective context (server, per-directory, per-file, or per-location) and set your preferred limit in bytes. For example, to set a new 2 GiB limit, use:
LimitRequestBody 2147483648
Systems already configured to use any explicit value for the "LimitRequestBody" directive are unaffected by this change.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)\n\n* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)\n\n* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)\n\n* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)\n\n* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2022319)\n\nAdditional changes:\n\n* To fix CVE-2022-29404, the default value for the \"LimitRequestBody\" directive in the Apache HTTP Server has been changed from 0 (unlimited) to 1 GiB. \n\nOn systems where the value of \"LimitRequestBody\" is not explicitly specified in an httpd configuration file, updating the httpd package sets \"LimitRequestBody\" to the default value of 1 GiB. As a consequence, if the total size of the HTTP request body exceeds this 1 GiB default limit, httpd returns the 413 Request Entity Too Large error code.\n\nIf the new default allowed size of an HTTP request message body is insufficient for your use case, update your httpd configuration files within the respective context (server, per-directory, per-file, or per-location) and set your preferred limit in bytes. For example, to set a new 2 GiB limit, use:\n\nLimitRequestBody 2147483648\n\nSystems already configured to use any explicit value for the \"LimitRequestBody\" directive are unaffected by this change.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:6753", url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/articles/6975397", url: "https://access.redhat.com/articles/6975397", }, { category: "external", summary: "1966728", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1966728", }, { category: "external", summary: "2005119", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005119", }, { category: "external", summary: "2005124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005124", }, { category: "external", summary: "2005128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005128", }, { category: "external", summary: "2034672", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2034672", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6753.json", }, ], title: "Red Hat Security Advisory: httpd24-httpd security and bug fix update", tracking: { current_release_date: "2025-01-09T06:13:02+00:00", generator: { date: "2025-01-09T06:13:02+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2022:6753", initial_release_date: "2022-09-29T13:33:06+00:00", revision_history: [ { date: "2022-09-29T13:33:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-09-29T13:33:06+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-09T06:13:02+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.src", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-23.el7.5?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-33193", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2021-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1966728", }, ], notes: [ { category: "description", text: "A NULL pointer dereference was found in Apache httpd mod_h2. The highest threat from this flaw is to system integrity.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Request splitting via HTTP/2 method injection and mod_proxy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33193", }, { category: "external", summary: "RHBZ#1966728", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1966728", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33193", url: "https://www.cve.org/CVERecord?id=CVE-2021-33193", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33193", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33193", }, { category: "external", summary: "https://portswigger.net/research/http2", url: "https://portswigger.net/research/http2", }, ], release_date: "2021-08-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "This flaw can be mitigated by disabling HTTP/2. More information available at: https://httpd.apache.org/docs/2.4/mod/mod_http2.html", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Request splitting via HTTP/2 method injection and mod_proxy", }, { cve: "CVE-2021-34798", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005128", }, ], notes: [ { category: "description", text: "A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: NULL pointer dereference via malformed requests", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-34798", }, { category: "external", summary: "RHBZ#2005128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-34798", url: "https://www.cve.org/CVERecord?id=CVE-2021-34798", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: NULL pointer dereference via malformed requests", }, { cve: "CVE-2021-36160", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005124", }, ], notes: [ { category: "description", text: "An out-of-bounds read in mod_proxy_uwsgi of httpd allows a remote unauthenticated attacker to crash the service through a crafted request. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-36160", }, { category: "external", summary: "RHBZ#2005124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-36160", url: "https://www.cve.org/CVERecord?id=CVE-2021-36160", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-36160", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-36160", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path", }, { cve: "CVE-2021-39275", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005119", }, ], notes: [ { category: "description", text: "An out-of-bounds write in function ap_escape_quotes of httpd allows an unauthenticated remote attacker to crash the server or potentially execute code on the system with the privileges of the httpd user, by providing malicious input to the function.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds write in ap_escape_quotes() via malicious input", title: "Vulnerability summary", }, { category: "other", text: "No httpd module in Red Hat Enterprise Linux and Red Hat Software Collections pass untrusted data to ap_escape_quotes function, thus the Impact of the flaw has been set to Moderate.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-39275", }, { category: "external", summary: "RHBZ#2005119", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005119", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-39275", url: "https://www.cve.org/CVERecord?id=CVE-2021-39275", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-39275", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-39275", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Out-of-bounds write in ap_escape_quotes() via malicious input", }, { cve: "CVE-2021-44224", cwe: { id: "CWE-918", name: "Server-Side Request Forgery (SSRF)", }, discovery_date: "2021-12-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2034672", }, ], notes: [ { category: "description", text: "There's a null pointer dereference and server-side request forgery flaw in httpd's mod_proxy module, when it is configured to be used as a forward proxy. A crafted packet could be sent on the adjacent network to the forward proxy that could cause a crash, or potentially SSRF via misdirected Unix Domain Socket requests. In the worst case, this could cause a denial of service or compromise to confidentiality of data.", title: "Vulnerability description", }, { category: "summary", text: "httpd: possible NULL dereference or SSRF in forward proxy configurations", title: "Vulnerability summary", }, { category: "other", text: "This flaw does not affect httpd configurations that do not use forward proxy functionality (configurations where ProxyRequests is turned off).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44224", }, { category: "external", summary: "RHBZ#2034672", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2034672", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44224", url: "https://www.cve.org/CVERecord?id=CVE-2021-44224", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44224", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44224", }, { category: "external", summary: "http://httpd.apache.org/security/vulnerabilities_24.html", url: "http://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2021-12-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: possible NULL dereference or SSRF in forward proxy configurations", }, { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
rhsa-2022_6753
Vulnerability from csaf_redhat
Published
2022-09-29 13:33
Modified
2024-11-15 14:57
Summary
Red Hat Security Advisory: httpd24-httpd security and bug fix update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2022319)
Additional changes:
* To fix CVE-2022-29404, the default value for the "LimitRequestBody" directive in the Apache HTTP Server has been changed from 0 (unlimited) to 1 GiB.
On systems where the value of "LimitRequestBody" is not explicitly specified in an httpd configuration file, updating the httpd package sets "LimitRequestBody" to the default value of 1 GiB. As a consequence, if the total size of the HTTP request body exceeds this 1 GiB default limit, httpd returns the 413 Request Entity Too Large error code.
If the new default allowed size of an HTTP request message body is insufficient for your use case, update your httpd configuration files within the respective context (server, per-directory, per-file, or per-location) and set your preferred limit in bytes. For example, to set a new 2 GiB limit, use:
LimitRequestBody 2147483648
Systems already configured to use any explicit value for the "LimitRequestBody" directive are unaffected by this change.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)\n\n* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)\n\n* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)\n\n* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)\n\n* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2022319)\n\nAdditional changes:\n\n* To fix CVE-2022-29404, the default value for the \"LimitRequestBody\" directive in the Apache HTTP Server has been changed from 0 (unlimited) to 1 GiB. \n\nOn systems where the value of \"LimitRequestBody\" is not explicitly specified in an httpd configuration file, updating the httpd package sets \"LimitRequestBody\" to the default value of 1 GiB. As a consequence, if the total size of the HTTP request body exceeds this 1 GiB default limit, httpd returns the 413 Request Entity Too Large error code.\n\nIf the new default allowed size of an HTTP request message body is insufficient for your use case, update your httpd configuration files within the respective context (server, per-directory, per-file, or per-location) and set your preferred limit in bytes. For example, to set a new 2 GiB limit, use:\n\nLimitRequestBody 2147483648\n\nSystems already configured to use any explicit value for the \"LimitRequestBody\" directive are unaffected by this change.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:6753", url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/articles/6975397", url: "https://access.redhat.com/articles/6975397", }, { category: "external", summary: "1966728", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1966728", }, { category: "external", summary: "2005119", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005119", }, { category: "external", summary: "2005124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005124", }, { category: "external", summary: "2005128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005128", }, { category: "external", summary: "2034672", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2034672", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6753.json", }, ], title: "Red Hat Security Advisory: httpd24-httpd security and bug fix update", tracking: { current_release_date: "2024-11-15T14:57:02+00:00", generator: { date: "2024-11-15T14:57:02+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:6753", initial_release_date: "2022-09-29T13:33:06+00:00", revision_history: [ { date: "2022-09-29T13:33:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-09-29T13:33:06+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T14:57:02+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.src", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-23.el7.5?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-33193", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2021-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1966728", }, ], notes: [ { category: "description", text: "A NULL pointer dereference was found in Apache httpd mod_h2. The highest threat from this flaw is to system integrity.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Request splitting via HTTP/2 method injection and mod_proxy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33193", }, { category: "external", summary: "RHBZ#1966728", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1966728", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33193", url: "https://www.cve.org/CVERecord?id=CVE-2021-33193", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33193", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33193", }, { category: "external", summary: "https://portswigger.net/research/http2", url: "https://portswigger.net/research/http2", }, ], release_date: "2021-08-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "This flaw can be mitigated by disabling HTTP/2. More information available at: https://httpd.apache.org/docs/2.4/mod/mod_http2.html", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Request splitting via HTTP/2 method injection and mod_proxy", }, { cve: "CVE-2021-34798", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005128", }, ], notes: [ { category: "description", text: "A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: NULL pointer dereference via malformed requests", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-34798", }, { category: "external", summary: "RHBZ#2005128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-34798", url: "https://www.cve.org/CVERecord?id=CVE-2021-34798", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: NULL pointer dereference via malformed requests", }, { cve: "CVE-2021-36160", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005124", }, ], notes: [ { category: "description", text: "An out-of-bounds read in mod_proxy_uwsgi of httpd allows a remote unauthenticated attacker to crash the service through a crafted request. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-36160", }, { category: "external", summary: "RHBZ#2005124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-36160", url: "https://www.cve.org/CVERecord?id=CVE-2021-36160", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-36160", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-36160", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path", }, { cve: "CVE-2021-39275", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005119", }, ], notes: [ { category: "description", text: "An out-of-bounds write in function ap_escape_quotes of httpd allows an unauthenticated remote attacker to crash the server or potentially execute code on the system with the privileges of the httpd user, by providing malicious input to the function.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds write in ap_escape_quotes() via malicious input", title: "Vulnerability summary", }, { category: "other", text: "No httpd module in Red Hat Enterprise Linux and Red Hat Software Collections pass untrusted data to ap_escape_quotes function, thus the Impact of the flaw has been set to Moderate.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-39275", }, { category: "external", summary: "RHBZ#2005119", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005119", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-39275", url: "https://www.cve.org/CVERecord?id=CVE-2021-39275", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-39275", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-39275", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Out-of-bounds write in ap_escape_quotes() via malicious input", }, { cve: "CVE-2021-44224", cwe: { id: "CWE-918", name: "Server-Side Request Forgery (SSRF)", }, discovery_date: "2021-12-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2034672", }, ], notes: [ { category: "description", text: "There's a null pointer dereference and server-side request forgery flaw in httpd's mod_proxy module, when it is configured to be used as a forward proxy. A crafted packet could be sent on the adjacent network to the forward proxy that could cause a crash, or potentially SSRF via misdirected Unix Domain Socket requests. In the worst case, this could cause a denial of service or compromise to confidentiality of data.", title: "Vulnerability description", }, { category: "summary", text: "httpd: possible NULL dereference or SSRF in forward proxy configurations", title: "Vulnerability summary", }, { category: "other", text: "This flaw does not affect httpd configurations that do not use forward proxy functionality (configurations where ProxyRequests is turned off).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44224", }, { category: "external", summary: "RHBZ#2034672", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2034672", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44224", url: "https://www.cve.org/CVERecord?id=CVE-2021-44224", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44224", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44224", }, { category: "external", summary: "http://httpd.apache.org/security/vulnerabilities_24.html", url: "http://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2021-12-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: possible NULL dereference or SSRF in forward proxy configurations", }, { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
RHSA-2022:6753
Vulnerability from csaf_redhat
Published
2022-09-29 13:33
Modified
2025-01-09 06:13
Summary
Red Hat Security Advisory: httpd24-httpd security and bug fix update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2022319)
Additional changes:
* To fix CVE-2022-29404, the default value for the "LimitRequestBody" directive in the Apache HTTP Server has been changed from 0 (unlimited) to 1 GiB.
On systems where the value of "LimitRequestBody" is not explicitly specified in an httpd configuration file, updating the httpd package sets "LimitRequestBody" to the default value of 1 GiB. As a consequence, if the total size of the HTTP request body exceeds this 1 GiB default limit, httpd returns the 413 Request Entity Too Large error code.
If the new default allowed size of an HTTP request message body is insufficient for your use case, update your httpd configuration files within the respective context (server, per-directory, per-file, or per-location) and set your preferred limit in bytes. For example, to set a new 2 GiB limit, use:
LimitRequestBody 2147483648
Systems already configured to use any explicit value for the "LimitRequestBody" directive are unaffected by this change.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)\n\n* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)\n\n* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)\n\n* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)\n\n* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2022319)\n\nAdditional changes:\n\n* To fix CVE-2022-29404, the default value for the \"LimitRequestBody\" directive in the Apache HTTP Server has been changed from 0 (unlimited) to 1 GiB. \n\nOn systems where the value of \"LimitRequestBody\" is not explicitly specified in an httpd configuration file, updating the httpd package sets \"LimitRequestBody\" to the default value of 1 GiB. As a consequence, if the total size of the HTTP request body exceeds this 1 GiB default limit, httpd returns the 413 Request Entity Too Large error code.\n\nIf the new default allowed size of an HTTP request message body is insufficient for your use case, update your httpd configuration files within the respective context (server, per-directory, per-file, or per-location) and set your preferred limit in bytes. For example, to set a new 2 GiB limit, use:\n\nLimitRequestBody 2147483648\n\nSystems already configured to use any explicit value for the \"LimitRequestBody\" directive are unaffected by this change.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:6753", url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/articles/6975397", url: "https://access.redhat.com/articles/6975397", }, { category: "external", summary: "1966728", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1966728", }, { category: "external", summary: "2005119", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005119", }, { category: "external", summary: "2005124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005124", }, { category: "external", summary: "2005128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005128", }, { category: "external", summary: "2034672", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2034672", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6753.json", }, ], title: "Red Hat Security Advisory: httpd24-httpd security and bug fix update", tracking: { current_release_date: "2025-01-09T06:13:02+00:00", generator: { date: "2025-01-09T06:13:02+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2022:6753", initial_release_date: "2022-09-29T13:33:06+00:00", revision_history: [ { date: "2022-09-29T13:33:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-09-29T13:33:06+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-09T06:13:02+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.src", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-23.el7.5?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product_id: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-33193", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2021-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1966728", }, ], notes: [ { category: "description", text: "A NULL pointer dereference was found in Apache httpd mod_h2. The highest threat from this flaw is to system integrity.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Request splitting via HTTP/2 method injection and mod_proxy", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33193", }, { category: "external", summary: "RHBZ#1966728", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1966728", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33193", url: "https://www.cve.org/CVERecord?id=CVE-2021-33193", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33193", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33193", }, { category: "external", summary: "https://portswigger.net/research/http2", url: "https://portswigger.net/research/http2", }, ], release_date: "2021-08-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "This flaw can be mitigated by disabling HTTP/2. More information available at: https://httpd.apache.org/docs/2.4/mod/mod_http2.html", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Request splitting via HTTP/2 method injection and mod_proxy", }, { cve: "CVE-2021-34798", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005128", }, ], notes: [ { category: "description", text: "A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: NULL pointer dereference via malformed requests", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-34798", }, { category: "external", summary: "RHBZ#2005128", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005128", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-34798", url: "https://www.cve.org/CVERecord?id=CVE-2021-34798", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: NULL pointer dereference via malformed requests", }, { cve: "CVE-2021-36160", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005124", }, ], notes: [ { category: "description", text: "An out-of-bounds read in mod_proxy_uwsgi of httpd allows a remote unauthenticated attacker to crash the service through a crafted request. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-36160", }, { category: "external", summary: "RHBZ#2005124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-36160", url: "https://www.cve.org/CVERecord?id=CVE-2021-36160", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-36160", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-36160", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path", }, { cve: "CVE-2021-39275", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2021-09-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2005119", }, ], notes: [ { category: "description", text: "An out-of-bounds write in function ap_escape_quotes of httpd allows an unauthenticated remote attacker to crash the server or potentially execute code on the system with the privileges of the httpd user, by providing malicious input to the function.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds write in ap_escape_quotes() via malicious input", title: "Vulnerability summary", }, { category: "other", text: "No httpd module in Red Hat Enterprise Linux and Red Hat Software Collections pass untrusted data to ap_escape_quotes function, thus the Impact of the flaw has been set to Moderate.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-39275", }, { category: "external", summary: "RHBZ#2005119", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2005119", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-39275", url: "https://www.cve.org/CVERecord?id=CVE-2021-39275", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-39275", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-39275", }, ], release_date: "2021-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Out-of-bounds write in ap_escape_quotes() via malicious input", }, { cve: "CVE-2021-44224", cwe: { id: "CWE-918", name: "Server-Side Request Forgery (SSRF)", }, discovery_date: "2021-12-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2034672", }, ], notes: [ { category: "description", text: "There's a null pointer dereference and server-side request forgery flaw in httpd's mod_proxy module, when it is configured to be used as a forward proxy. A crafted packet could be sent on the adjacent network to the forward proxy that could cause a crash, or potentially SSRF via misdirected Unix Domain Socket requests. In the worst case, this could cause a denial of service or compromise to confidentiality of data.", title: "Vulnerability description", }, { category: "summary", text: "httpd: possible NULL dereference or SSRF in forward proxy configurations", title: "Vulnerability summary", }, { category: "other", text: "This flaw does not affect httpd configurations that do not use forward proxy functionality (configurations where ProxyRequests is turned off).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44224", }, { category: "external", summary: "RHBZ#2034672", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2034672", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44224", url: "https://www.cve.org/CVERecord?id=CVE-2021-44224", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44224", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44224", }, { category: "external", summary: "http://httpd.apache.org/security/vulnerabilities_24.html", url: "http://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2021-12-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: possible NULL dereference or SSRF in forward proxy configurations", }, { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-09-29T13:33:06+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
RHSA-2022:8067
Vulnerability from csaf_redhat
Published
2022-11-15 09:58
Modified
2025-01-09 06:13
Summary
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nThe following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:8067", url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2073459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073459", }, { category: "external", summary: "2075406", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2075406", }, { category: "external", summary: "2079939", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2079939", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "2095838", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095838", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8067.json", }, ], title: "Red Hat Security Advisory: httpd security, bug fix, and enhancement update", tracking: { current_release_date: "2025-01-09T06:13:03+00:00", generator: { date: "2025-01-09T06:13:03+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2022:8067", initial_release_date: "2022-11-15T09:58:32+00:00", revision_history: [ { date: "2022-11-15T09:58:32+00:00", number: "1", summary: "Initial version", }, { date: "2022-11-15T09:58:32+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-09T06:13:03+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.src", product: { name: "httpd-0:2.4.53-7.el9.src", product_id: "httpd-0:2.4.53-7.el9.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.aarch64", product: { name: "httpd-0:2.4.53-7.el9.aarch64", product_id: "httpd-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.aarch64", product: { name: "httpd-core-0:2.4.53-7.el9.aarch64", product_id: "httpd-core-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.aarch64", product: { name: "httpd-devel-0:2.4.53-7.el9.aarch64", product_id: "httpd-devel-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.aarch64", product: { name: "httpd-tools-0:2.4.53-7.el9.aarch64", product_id: "httpd-tools-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.aarch64", product: { name: "mod_ldap-0:2.4.53-7.el9.aarch64", product_id: "mod_ldap-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.aarch64", product: { name: "mod_lua-0:2.4.53-7.el9.aarch64", product_id: "mod_lua-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product: { name: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product_id: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.aarch64", product: { name: "mod_session-0:2.4.53-7.el9.aarch64", product_id: "mod_session-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.aarch64", product: { name: "mod_ssl-1:2.4.53-7.el9.aarch64", product_id: "mod_ssl-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product: { name: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product_id: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-0:2.4.53-7.el9.ppc64le", product_id: "httpd-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-core-0:2.4.53-7.el9.ppc64le", product_id: "httpd-core-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-devel-0:2.4.53-7.el9.ppc64le", product_id: "httpd-devel-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-tools-0:2.4.53-7.el9.ppc64le", product_id: "httpd-tools-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.ppc64le", product: { name: "mod_ldap-0:2.4.53-7.el9.ppc64le", product_id: "mod_ldap-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.ppc64le", product: { name: "mod_lua-0:2.4.53-7.el9.ppc64le", product_id: "mod_lua-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product: { name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product_id: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.ppc64le", product: { name: "mod_session-0:2.4.53-7.el9.ppc64le", product_id: "mod_session-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.ppc64le", product: { name: "mod_ssl-1:2.4.53-7.el9.ppc64le", product_id: "mod_ssl-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product_id: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.x86_64", product: { name: "httpd-0:2.4.53-7.el9.x86_64", product_id: "httpd-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.x86_64", product: { name: "httpd-core-0:2.4.53-7.el9.x86_64", product_id: "httpd-core-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.x86_64", product: { name: "httpd-devel-0:2.4.53-7.el9.x86_64", product_id: "httpd-devel-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.x86_64", product: { name: "httpd-tools-0:2.4.53-7.el9.x86_64", product_id: "httpd-tools-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.x86_64", product: { name: "mod_ldap-0:2.4.53-7.el9.x86_64", product_id: "mod_ldap-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.x86_64", product: { name: "mod_lua-0:2.4.53-7.el9.x86_64", product_id: "mod_lua-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product: { name: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product_id: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.x86_64", product: { name: "mod_session-0:2.4.53-7.el9.x86_64", product_id: "mod_session-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.x86_64", product: { name: "mod_ssl-1:2.4.53-7.el9.x86_64", product_id: "mod_ssl-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product: { name: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product_id: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.s390x", product: { name: "httpd-0:2.4.53-7.el9.s390x", product_id: "httpd-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.s390x", product: { name: "httpd-core-0:2.4.53-7.el9.s390x", product_id: "httpd-core-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.s390x", product: { name: "httpd-devel-0:2.4.53-7.el9.s390x", product_id: "httpd-devel-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.s390x", product: { name: "httpd-tools-0:2.4.53-7.el9.s390x", product_id: "httpd-tools-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.s390x", product: { name: "mod_ldap-0:2.4.53-7.el9.s390x", product_id: "mod_ldap-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.s390x", product: { name: "mod_lua-0:2.4.53-7.el9.s390x", product_id: "mod_lua-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.s390x", product: { name: "mod_proxy_html-1:2.4.53-7.el9.s390x", product_id: "mod_proxy_html-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.s390x", product: { name: "mod_session-0:2.4.53-7.el9.s390x", product_id: "mod_session-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.s390x", product: { name: "mod_ssl-1:2.4.53-7.el9.s390x", product_id: "mod_ssl-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.s390x", product: { name: "httpd-debugsource-0:2.4.53-7.el9.s390x", product_id: "httpd-debugsource-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-filesystem-0:2.4.53-7.el9.noarch", product: { name: "httpd-filesystem-0:2.4.53-7.el9.noarch", product_id: "httpd-filesystem-0:2.4.53-7.el9.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.53-7.el9?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.53-7.el9.noarch", product: { name: "httpd-manual-0:2.4.53-7.el9.noarch", product_id: "httpd-manual-0:2.4.53-7.el9.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.53-7.el9?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", }, product_reference: "httpd-0:2.4.53-7.el9.src", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-core-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-core-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-core-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-core-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-devel-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-devel-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-devel-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-devel-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.53-7.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", }, product_reference: "httpd-filesystem-0:2.4.53-7.el9.noarch", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.53-7.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", }, product_reference: "httpd-manual-0:2.4.53-7.el9.noarch", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-tools-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-tools-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-tools-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-tools-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_ldap-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ldap-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", }, product_reference: "mod_ldap-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_ldap-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_lua-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_lua-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", }, product_reference: "mod_lua-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_lua-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_session-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_session-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", }, product_reference: "mod_session-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_session-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_ssl-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ssl-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", }, product_reference: "mod_ssl-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_ssl-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, ], }, vulnerabilities: [ { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
rhsa-2022:8067
Vulnerability from csaf_redhat
Published
2022-11-15 09:58
Modified
2025-01-09 06:13
Summary
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nThe following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:8067", url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", }, { category: "external", summary: "2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "2073459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2073459", }, { category: "external", summary: "2075406", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2075406", }, { category: "external", summary: "2079939", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2079939", }, { category: "external", summary: "2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "2095838", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095838", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8067.json", }, ], title: "Red Hat Security Advisory: httpd security, bug fix, and enhancement update", tracking: { current_release_date: "2025-01-09T06:13:03+00:00", generator: { date: "2025-01-09T06:13:03+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2022:8067", initial_release_date: "2022-11-15T09:58:32+00:00", revision_history: [ { date: "2022-11-15T09:58:32+00:00", number: "1", summary: "Initial version", }, { date: "2022-11-15T09:58:32+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-09T06:13:03+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.src", product: { name: "httpd-0:2.4.53-7.el9.src", product_id: "httpd-0:2.4.53-7.el9.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.aarch64", product: { name: "httpd-0:2.4.53-7.el9.aarch64", product_id: "httpd-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.aarch64", product: { name: "httpd-core-0:2.4.53-7.el9.aarch64", product_id: "httpd-core-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.aarch64", product: { name: "httpd-devel-0:2.4.53-7.el9.aarch64", product_id: "httpd-devel-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.aarch64", product: { name: "httpd-tools-0:2.4.53-7.el9.aarch64", product_id: "httpd-tools-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.aarch64", product: { name: "mod_ldap-0:2.4.53-7.el9.aarch64", product_id: "mod_ldap-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.aarch64", product: { name: "mod_lua-0:2.4.53-7.el9.aarch64", product_id: "mod_lua-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product: { name: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product_id: "mod_proxy_html-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.aarch64", product: { name: "mod_session-0:2.4.53-7.el9.aarch64", product_id: "mod_session-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.aarch64", product: { name: "mod_ssl-1:2.4.53-7.el9.aarch64", product_id: "mod_ssl-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product: { name: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product_id: "httpd-debugsource-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-0:2.4.53-7.el9.ppc64le", product_id: "httpd-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-core-0:2.4.53-7.el9.ppc64le", product_id: "httpd-core-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-devel-0:2.4.53-7.el9.ppc64le", product_id: "httpd-devel-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-tools-0:2.4.53-7.el9.ppc64le", product_id: "httpd-tools-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.ppc64le", product: { name: "mod_ldap-0:2.4.53-7.el9.ppc64le", product_id: "mod_ldap-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.ppc64le", product: { name: "mod_lua-0:2.4.53-7.el9.ppc64le", product_id: "mod_lua-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product: { name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product_id: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.ppc64le", product: { name: "mod_session-0:2.4.53-7.el9.ppc64le", product_id: "mod_session-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.ppc64le", product: { name: "mod_ssl-1:2.4.53-7.el9.ppc64le", product_id: "mod_ssl-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product_id: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.x86_64", product: { name: "httpd-0:2.4.53-7.el9.x86_64", product_id: "httpd-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.x86_64", product: { name: "httpd-core-0:2.4.53-7.el9.x86_64", product_id: "httpd-core-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.x86_64", product: { name: "httpd-devel-0:2.4.53-7.el9.x86_64", product_id: "httpd-devel-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.x86_64", product: { name: "httpd-tools-0:2.4.53-7.el9.x86_64", product_id: "httpd-tools-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.x86_64", product: { name: "mod_ldap-0:2.4.53-7.el9.x86_64", product_id: "mod_ldap-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.x86_64", product: { name: "mod_lua-0:2.4.53-7.el9.x86_64", product_id: "mod_lua-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product: { name: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product_id: "mod_proxy_html-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.x86_64", product: { name: "mod_session-0:2.4.53-7.el9.x86_64", product_id: "mod_session-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.x86_64", product: { name: "mod_ssl-1:2.4.53-7.el9.x86_64", product_id: "mod_ssl-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product: { name: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product_id: "httpd-debugsource-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.53-7.el9.s390x", product: { name: "httpd-0:2.4.53-7.el9.s390x", product_id: "httpd-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-core-0:2.4.53-7.el9.s390x", product: { name: "httpd-core-0:2.4.53-7.el9.s390x", product_id: "httpd-core-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.53-7.el9.s390x", product: { name: "httpd-devel-0:2.4.53-7.el9.s390x", product_id: "httpd-devel-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.53-7.el9.s390x", product: { name: "httpd-tools-0:2.4.53-7.el9.s390x", product_id: "httpd-tools-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.53-7.el9.s390x", product: { name: "mod_ldap-0:2.4.53-7.el9.s390x", product_id: "mod_ldap-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_lua-0:2.4.53-7.el9.s390x", product: { name: "mod_lua-0:2.4.53-7.el9.s390x", product_id: "mod_lua-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.53-7.el9.s390x", product: { name: "mod_proxy_html-1:2.4.53-7.el9.s390x", product_id: "mod_proxy_html-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.53-7.el9.s390x", product: { name: "mod_session-0:2.4.53-7.el9.s390x", product_id: "mod_session-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.53-7.el9.s390x", product: { name: "mod_ssl-1:2.4.53-7.el9.s390x", product_id: "mod_ssl-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.53-7.el9.s390x", product: { name: "httpd-debugsource-0:2.4.53-7.el9.s390x", product_id: "httpd-debugsource-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product_id: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product: { name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product_id: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product_id: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-filesystem-0:2.4.53-7.el9.noarch", product: { name: "httpd-filesystem-0:2.4.53-7.el9.noarch", product_id: "httpd-filesystem-0:2.4.53-7.el9.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.53-7.el9?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.53-7.el9.noarch", product: { name: "httpd-manual-0:2.4.53-7.el9.noarch", product_id: "httpd-manual-0:2.4.53-7.el9.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.53-7.el9?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", }, product_reference: "httpd-0:2.4.53-7.el9.src", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-core-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-core-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-core-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-core-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-debugsource-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-devel-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-devel-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-devel-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-devel-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.53-7.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", }, product_reference: "httpd-filesystem-0:2.4.53-7.el9.noarch", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.53-7.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", }, product_reference: "httpd-manual-0:2.4.53-7.el9.noarch", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-tools-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-tools-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-tools-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-tools-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_ldap-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ldap-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", }, product_reference: "mod_ldap-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_ldap-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_lua-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_lua-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", }, product_reference: "mod_lua-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_lua-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_proxy_html-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_session-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_session-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", }, product_reference: "mod_session-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_session-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_ssl-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ssl-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", }, product_reference: "mod_ssl-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_ssl-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", relates_to_product_reference: "AppStream-9.1.0.GA", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", relates_to_product_reference: "AppStream-9.1.0.GA", }, ], }, vulnerabilities: [ { cve: "CVE-2022-22719", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064322", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22719", }, { category: "external", summary: "RHBZ#2064322", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064322", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22719", url: "https://www.cve.org/CVERecord?id=CVE-2022-22719", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: Use of uninitialized value of in r:parsebody", }, { cve: "CVE-2022-22721", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064320", }, ], notes: [ { category: "description", text: "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", title: "Vulnerability description", }, { category: "summary", text: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", title: "Vulnerability summary", }, { category: "other", text: "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-22721", }, { category: "external", summary: "RHBZ#2064320", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064320", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-22721", url: "https://www.cve.org/CVERecord?id=CVE-2022-22721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", }, { cve: "CVE-2022-23943", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-03-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2064319", }, ], notes: [ { category: "description", text: "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: Read/write beyond bounds", title: "Vulnerability summary", }, { category: "other", text: "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-23943", }, { category: "external", summary: "RHBZ#2064319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2064319", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-23943", url: "https://www.cve.org/CVERecord?id=CVE-2022-23943", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", }, ], release_date: "2022-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: Read/write beyond bounds", }, { cve: "CVE-2022-26377", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2094997", }, ], notes: [ { category: "description", text: "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp: Possible request smuggling", title: "Vulnerability summary", }, { category: "other", text: "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "RHBZ#2094997", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2094997", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-26377", url: "https://www.cve.org/CVERecord?id=CVE-2022-26377", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy_ajp: Possible request smuggling", }, { cve: "CVE-2022-28614", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095002", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read via ap_rwrite()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "RHBZ#2095002", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095002", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28614", url: "https://www.cve.org/CVERecord?id=CVE-2022-28614", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read via ap_rwrite()", }, { cve: "CVE-2022-28615", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095006", }, ], notes: [ { category: "description", text: "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Out-of-bounds read in ap_strcmp_match()", title: "Vulnerability summary", }, { category: "other", text: "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "RHBZ#2095006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-28615", url: "https://www.cve.org/CVERecord?id=CVE-2022-28615", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: Out-of-bounds read in ap_strcmp_match()", }, { cve: "CVE-2022-29404", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095012", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: DoS in r:parsebody", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "RHBZ#2095012", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095012", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-29404", url: "https://www.cve.org/CVERecord?id=CVE-2022-29404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_lua: DoS in r:parsebody", }, { cve: "CVE-2022-30522", cwe: { id: "CWE-789", name: "Memory Allocation with Excessive Size Value", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095015", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_sed: DoS vulnerability", title: "Vulnerability summary", }, { category: "other", text: "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "RHBZ#2095015", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095015", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30522", url: "https://www.cve.org/CVERecord?id=CVE-2022-30522", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_sed and restating httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_sed: DoS vulnerability", }, { cve: "CVE-2022-30556", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095018", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_lua: Information disclosure with websockets", title: "Vulnerability summary", }, { category: "other", text: "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "RHBZ#2095018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-30556", url: "https://www.cve.org/CVERecord?id=CVE-2022-30556", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Disabling mod_lua and restarting httpd will mitigate this flaw.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_lua: Information disclosure with websockets", }, { cve: "CVE-2022-31813", cwe: { id: "CWE-348", name: "Use of Less Trusted Source", }, discovery_date: "2022-06-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2095020", }, ], notes: [ { category: "description", text: "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", title: "Vulnerability summary", }, { category: "other", text: "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "RHBZ#2095020", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2095020", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-31813", url: "https://www.cve.org/CVERecord?id=CVE-2022-31813", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", }, ], release_date: "2022-06-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-11-15T09:58:32+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", }, ], }
fkie_cve-2022-29404
Vulnerability from fkie_nvd
Published
2022-06-09 17:15
Modified
2024-11-21 06:59
Severity ?
Summary
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | http_server | * | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 | |
netapp | clustered_data_ontap | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", matchCriteriaId: "B39537A1-5A13-491A-B333-BB53FF718EA7", versionEndIncluding: "2.4.53", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", matchCriteriaId: "1FE996B1-6951-4F85-AA58-B99A379D2163", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", }, { lang: "es", value: "En Apache HTTP Server 2.4.53 y anteriores, una petición maliciosa a un script lua que llame a r:parsebody(0) puede causar una denegación de servicio debido a que no presenta un límite por defecto en el tamaño posible de la entrada", }, ], id: "CVE-2022-29404", lastModified: "2024-11-21T06:59:01.000", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-06-09T17:15:09.283", references: [ { source: "security@apache.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2022/06/08/5", }, { source: "security@apache.org", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { source: "security@apache.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/", }, { source: "security@apache.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-20", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2022/06/08/5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-20", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-770", }, ], source: "security@apache.org", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2022-29404
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
Aliases
Aliases
{ GSD: { alias: "CVE-2022-29404", description: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", id: "GSD-2022-29404", references: [ "https://security.archlinux.org/CVE-2022-29404", "https://advisories.mageia.org/CVE-2022-29404.html", "https://www.suse.com/security/cve/CVE-2022-29404.html", "https://ubuntu.com/security/CVE-2022-29404", "https://alas.aws.amazon.com/cve/html/CVE-2022-29404.html", "https://access.redhat.com/errata/RHSA-2022:6753", "https://access.redhat.com/errata/RHSA-2022:7647", "https://access.redhat.com/errata/RHSA-2022:8067", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2022-29404", ], details: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", id: "GSD-2022-29404", modified: "2023-12-13T01:19:41.710588Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2022-29404", STATE: "PUBLIC", TITLE: "Denial of service in mod_lua r:parsebody", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache HTTP Server", version: { version_data: [ { version_affected: "<=", version_value: "2.4.53", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, credit: [ { lang: "eng", value: "The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: [ { other: "low", }, ], problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-770: Allocation of Resources Without Limits or Throttling", }, ], }, ], }, references: { reference_data: [ { name: "https://httpd.apache.org/security/vulnerabilities_24.html", refsource: "MISC", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { name: "[oss-security] 20220608 CVE-2022-29404: Apache HTTP Server: Denial of service in mod_lua r:parsebody", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/06/08/5", }, { name: "https://security.netapp.com/advisory/ntap-20220624-0005/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, { name: "FEDORA-2022-e620fb15d5", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/", }, { name: "FEDORA-2022-b54a8dee29", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/", }, { name: "GLSA-202208-20", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-20", }, ], }, source: { discovery: "UNKNOWN", }, timeline: [ { lang: "eng", time: "2022-06-08", value: "released in 2.4.54", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.4.53", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2022-29404", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-770", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20220608 CVE-2022-29404: Apache HTTP Server: Denial of service in mod_lua r:parsebody", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2022/06/08/5", }, { name: "https://httpd.apache.org/security/vulnerabilities_24.html", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { name: "https://security.netapp.com/advisory/ntap-20220624-0005/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, { name: "FEDORA-2022-e620fb15d5", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/", }, { name: "FEDORA-2022-b54a8dee29", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/", }, { name: "GLSA-202208-20", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-20", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2022-08-24T18:17Z", publishedDate: "2022-06-09T17:15Z", }, }, }
suse-su-2022:2101-1
Vulnerability from csaf_suse
Published
2022-06-16 12:47
Modified
2022-06-16 12:47
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
Patchnames
SUSE-2022-2101,SUSE-SLE-SDK-12-SP5-2022-2101,SUSE-SLE-SERVER-12-SP5-2022-2101
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)\n- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)\n- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)\n- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)\n- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)\n- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)\n- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-2101,SUSE-SLE-SDK-12-SP5-2022-2101,SUSE-SLE-SERVER-12-SP5-2022-2101", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2101-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2101-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222101-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2101-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html", }, { category: "self", summary: "SUSE Bug 1200338", url: "https://bugzilla.suse.com/1200338", }, { category: "self", summary: "SUSE Bug 1200340", url: "https://bugzilla.suse.com/1200340", }, { category: "self", summary: "SUSE Bug 1200341", url: "https://bugzilla.suse.com/1200341", }, { category: "self", summary: "SUSE Bug 1200345", url: "https://bugzilla.suse.com/1200345", }, { category: "self", summary: "SUSE Bug 1200348", url: "https://bugzilla.suse.com/1200348", }, { category: "self", summary: "SUSE Bug 1200350", url: "https://bugzilla.suse.com/1200350", }, { category: "self", summary: "SUSE Bug 1200352", url: "https://bugzilla.suse.com/1200352", }, { category: "self", summary: "SUSE CVE CVE-2022-26377 page", url: "https://www.suse.com/security/cve/CVE-2022-26377/", }, { category: "self", summary: "SUSE CVE CVE-2022-28614 page", url: "https://www.suse.com/security/cve/CVE-2022-28614/", }, { category: "self", summary: "SUSE CVE CVE-2022-28615 page", url: "https://www.suse.com/security/cve/CVE-2022-28615/", }, { category: "self", summary: "SUSE CVE CVE-2022-29404 page", url: "https://www.suse.com/security/cve/CVE-2022-29404/", }, { category: "self", summary: "SUSE CVE CVE-2022-30522 page", url: "https://www.suse.com/security/cve/CVE-2022-30522/", }, { category: "self", summary: "SUSE CVE CVE-2022-30556 page", url: "https://www.suse.com/security/cve/CVE-2022-30556/", }, { category: "self", summary: "SUSE CVE CVE-2022-31813 page", url: "https://www.suse.com/security/cve/CVE-2022-31813/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2022-06-16T12:47:15Z", generator: { date: "2022-06-16T12:47:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2101-1", initial_release_date: "2022-06-16T12:47:15Z", revision_history: [ { date: "2022-06-16T12:47:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.51-35.19.1.aarch64", product: { name: "apache2-2.4.51-35.19.1.aarch64", product_id: "apache2-2.4.51-35.19.1.aarch64", }, }, { category: "product_version", name: "apache2-devel-2.4.51-35.19.1.aarch64", product: { name: "apache2-devel-2.4.51-35.19.1.aarch64", product_id: "apache2-devel-2.4.51-35.19.1.aarch64", }, }, { category: "product_version", name: "apache2-event-2.4.51-35.19.1.aarch64", product: { name: "apache2-event-2.4.51-35.19.1.aarch64", product_id: "apache2-event-2.4.51-35.19.1.aarch64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-35.19.1.aarch64", product: { name: "apache2-example-pages-2.4.51-35.19.1.aarch64", product_id: "apache2-example-pages-2.4.51-35.19.1.aarch64", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-35.19.1.aarch64", product: { name: "apache2-prefork-2.4.51-35.19.1.aarch64", product_id: "apache2-prefork-2.4.51-35.19.1.aarch64", }, }, { category: "product_version", name: "apache2-utils-2.4.51-35.19.1.aarch64", product: { name: "apache2-utils-2.4.51-35.19.1.aarch64", product_id: "apache2-utils-2.4.51-35.19.1.aarch64", }, }, { category: "product_version", name: "apache2-worker-2.4.51-35.19.1.aarch64", product: { name: "apache2-worker-2.4.51-35.19.1.aarch64", product_id: "apache2-worker-2.4.51-35.19.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-35.19.1.i586", product: { name: "apache2-2.4.51-35.19.1.i586", product_id: "apache2-2.4.51-35.19.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.51-35.19.1.i586", product: { name: "apache2-devel-2.4.51-35.19.1.i586", product_id: "apache2-devel-2.4.51-35.19.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.51-35.19.1.i586", product: { name: "apache2-event-2.4.51-35.19.1.i586", product_id: "apache2-event-2.4.51-35.19.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-35.19.1.i586", product: { name: "apache2-example-pages-2.4.51-35.19.1.i586", product_id: "apache2-example-pages-2.4.51-35.19.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-35.19.1.i586", product: { name: "apache2-prefork-2.4.51-35.19.1.i586", product_id: "apache2-prefork-2.4.51-35.19.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.51-35.19.1.i586", product: { name: "apache2-utils-2.4.51-35.19.1.i586", product_id: "apache2-utils-2.4.51-35.19.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.51-35.19.1.i586", product: { name: "apache2-worker-2.4.51-35.19.1.i586", product_id: "apache2-worker-2.4.51-35.19.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.51-35.19.1.noarch", product: { name: "apache2-doc-2.4.51-35.19.1.noarch", product_id: "apache2-doc-2.4.51-35.19.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-35.19.1.ppc64le", product: { name: "apache2-2.4.51-35.19.1.ppc64le", product_id: "apache2-2.4.51-35.19.1.ppc64le", }, }, { category: "product_version", name: "apache2-devel-2.4.51-35.19.1.ppc64le", product: { name: "apache2-devel-2.4.51-35.19.1.ppc64le", product_id: "apache2-devel-2.4.51-35.19.1.ppc64le", }, }, { category: "product_version", name: "apache2-event-2.4.51-35.19.1.ppc64le", product: { name: "apache2-event-2.4.51-35.19.1.ppc64le", product_id: "apache2-event-2.4.51-35.19.1.ppc64le", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-35.19.1.ppc64le", product: { name: "apache2-example-pages-2.4.51-35.19.1.ppc64le", product_id: "apache2-example-pages-2.4.51-35.19.1.ppc64le", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-35.19.1.ppc64le", product: { name: "apache2-prefork-2.4.51-35.19.1.ppc64le", product_id: "apache2-prefork-2.4.51-35.19.1.ppc64le", }, }, { category: "product_version", name: "apache2-utils-2.4.51-35.19.1.ppc64le", product: { name: "apache2-utils-2.4.51-35.19.1.ppc64le", product_id: "apache2-utils-2.4.51-35.19.1.ppc64le", }, }, { category: "product_version", name: "apache2-worker-2.4.51-35.19.1.ppc64le", product: { name: "apache2-worker-2.4.51-35.19.1.ppc64le", product_id: "apache2-worker-2.4.51-35.19.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-35.19.1.s390", product: { name: "apache2-2.4.51-35.19.1.s390", product_id: "apache2-2.4.51-35.19.1.s390", }, }, { category: "product_version", name: "apache2-devel-2.4.51-35.19.1.s390", product: { name: "apache2-devel-2.4.51-35.19.1.s390", product_id: "apache2-devel-2.4.51-35.19.1.s390", }, }, { category: "product_version", name: "apache2-event-2.4.51-35.19.1.s390", product: { name: "apache2-event-2.4.51-35.19.1.s390", product_id: "apache2-event-2.4.51-35.19.1.s390", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-35.19.1.s390", product: { name: "apache2-example-pages-2.4.51-35.19.1.s390", product_id: "apache2-example-pages-2.4.51-35.19.1.s390", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-35.19.1.s390", product: { name: "apache2-prefork-2.4.51-35.19.1.s390", product_id: "apache2-prefork-2.4.51-35.19.1.s390", }, }, { category: "product_version", name: "apache2-utils-2.4.51-35.19.1.s390", product: { name: "apache2-utils-2.4.51-35.19.1.s390", product_id: "apache2-utils-2.4.51-35.19.1.s390", }, }, { category: "product_version", name: "apache2-worker-2.4.51-35.19.1.s390", product: { name: "apache2-worker-2.4.51-35.19.1.s390", product_id: "apache2-worker-2.4.51-35.19.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-35.19.1.s390x", product: { name: "apache2-2.4.51-35.19.1.s390x", product_id: "apache2-2.4.51-35.19.1.s390x", }, }, { category: "product_version", name: "apache2-devel-2.4.51-35.19.1.s390x", product: { name: "apache2-devel-2.4.51-35.19.1.s390x", product_id: "apache2-devel-2.4.51-35.19.1.s390x", }, }, { category: "product_version", name: "apache2-event-2.4.51-35.19.1.s390x", product: { name: "apache2-event-2.4.51-35.19.1.s390x", product_id: "apache2-event-2.4.51-35.19.1.s390x", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-35.19.1.s390x", product: { name: "apache2-example-pages-2.4.51-35.19.1.s390x", product_id: "apache2-example-pages-2.4.51-35.19.1.s390x", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-35.19.1.s390x", product: { name: "apache2-prefork-2.4.51-35.19.1.s390x", product_id: "apache2-prefork-2.4.51-35.19.1.s390x", }, }, { category: "product_version", name: "apache2-utils-2.4.51-35.19.1.s390x", product: { name: "apache2-utils-2.4.51-35.19.1.s390x", product_id: "apache2-utils-2.4.51-35.19.1.s390x", }, }, { category: "product_version", name: "apache2-worker-2.4.51-35.19.1.s390x", product: { name: "apache2-worker-2.4.51-35.19.1.s390x", product_id: "apache2-worker-2.4.51-35.19.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-35.19.1.x86_64", product: { name: "apache2-2.4.51-35.19.1.x86_64", product_id: "apache2-2.4.51-35.19.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.51-35.19.1.x86_64", product: { name: "apache2-devel-2.4.51-35.19.1.x86_64", product_id: "apache2-devel-2.4.51-35.19.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.51-35.19.1.x86_64", product: { name: "apache2-event-2.4.51-35.19.1.x86_64", product_id: "apache2-event-2.4.51-35.19.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-35.19.1.x86_64", product: { name: "apache2-example-pages-2.4.51-35.19.1.x86_64", product_id: "apache2-example-pages-2.4.51-35.19.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-35.19.1.x86_64", product: { name: "apache2-prefork-2.4.51-35.19.1.x86_64", product_id: "apache2-prefork-2.4.51-35.19.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.51-35.19.1.x86_64", product: { name: "apache2-utils-2.4.51-35.19.1.x86_64", product_id: "apache2-utils-2.4.51-35.19.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.51-35.19.1.x86_64", product: { name: "apache2-worker-2.4.51-35.19.1.x86_64", product_id: "apache2-worker-2.4.51-35.19.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-devel-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-devel-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", }, product_reference: "apache2-devel-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-devel-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", }, product_reference: "apache2-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-35.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", }, product_reference: "apache2-doc-2.4.51-35.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-example-pages-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", }, product_reference: "apache2-example-pages-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-example-pages-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", }, product_reference: "apache2-prefork-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-utils-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", }, product_reference: "apache2-utils-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-utils-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-worker-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", }, product_reference: "apache2-worker-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-worker-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", }, product_reference: "apache2-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-35.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", }, product_reference: "apache2-doc-2.4.51-35.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-example-pages-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", }, product_reference: "apache2-example-pages-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-example-pages-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", }, product_reference: "apache2-prefork-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-utils-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", }, product_reference: "apache2-utils-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-utils-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-35.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", }, product_reference: "apache2-worker-2.4.51-35.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-35.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-35.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-35.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", }, product_reference: "apache2-worker-2.4.51-35.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-35.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", }, product_reference: "apache2-worker-2.4.51-35.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2022-26377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26377", }, ], notes: [ { category: "general", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26377", url: "https://www.suse.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "SUSE Bug 1200338 for CVE-2022-26377", url: "https://bugzilla.suse.com/1200338", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:47:15Z", details: "important", }, ], title: "CVE-2022-26377", }, { cve: "CVE-2022-28614", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28614", }, ], notes: [ { category: "general", text: "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28614", url: "https://www.suse.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "SUSE Bug 1200340 for CVE-2022-28614", url: "https://bugzilla.suse.com/1200340", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:47:15Z", details: "moderate", }, ], title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28615", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28615", url: "https://www.suse.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "SUSE Bug 1200341 for CVE-2022-28615", url: "https://bugzilla.suse.com/1200341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:47:15Z", details: "important", }, ], title: "CVE-2022-28615", }, { cve: "CVE-2022-29404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29404", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29404", url: "https://www.suse.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "SUSE Bug 1200345 for CVE-2022-29404", url: "https://bugzilla.suse.com/1200345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:47:15Z", details: "moderate", }, ], title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30522", }, ], notes: [ { category: "general", text: "If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30522", url: "https://www.suse.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "SUSE Bug 1200352 for CVE-2022-30522", url: "https://bugzilla.suse.com/1200352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:47:15Z", details: "moderate", }, ], title: "CVE-2022-30522", }, { cve: "CVE-2022-30556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30556", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30556", url: "https://www.suse.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "SUSE Bug 1200350 for CVE-2022-30556", url: "https://bugzilla.suse.com/1200350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:47:15Z", details: "moderate", }, ], title: "CVE-2022-30556", }, { cve: "CVE-2022-31813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31813", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31813", url: "https://www.suse.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "SUSE Bug 1200348 for CVE-2022-31813", url: "https://bugzilla.suse.com/1200348", }, { category: "external", summary: "SUSE Bug 1219585 for CVE-2022-31813", url: "https://bugzilla.suse.com/1219585", }, { category: "external", summary: "SUSE Bug 1225670 for CVE-2022-31813", url: "https://bugzilla.suse.com/1225670", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.19.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:47:15Z", details: "moderate", }, ], title: "CVE-2022-31813", }, ], }
suse-su-2022:2302-1
Vulnerability from csaf_suse
Published
2022-07-06 11:37
Modified
2022-07-06 11:37
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
Patchnames
SUSE-2022-2302,SUSE-SLE-Module-Basesystem-15-SP4-2022-2302,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2302,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2302,openSUSE-SLE-15.4-2022-2302
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n - CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)\n - CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)\n - CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)\n - CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)\n - CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)\n - CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)\n - CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-2302,SUSE-SLE-Module-Basesystem-15-SP4-2022-2302,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2302,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2302,openSUSE-SLE-15.4-2022-2302", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2302-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2302-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222302-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2302-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html", }, { category: "self", summary: "SUSE Bug 1198913", url: "https://bugzilla.suse.com/1198913", }, { category: "self", summary: "SUSE Bug 1200338", url: "https://bugzilla.suse.com/1200338", }, { category: "self", summary: "SUSE Bug 1200340", url: "https://bugzilla.suse.com/1200340", }, { category: "self", summary: "SUSE Bug 1200341", url: "https://bugzilla.suse.com/1200341", }, { category: "self", summary: "SUSE Bug 1200345", url: "https://bugzilla.suse.com/1200345", }, { category: "self", summary: "SUSE Bug 1200348", url: "https://bugzilla.suse.com/1200348", }, { category: "self", summary: "SUSE Bug 1200350", url: "https://bugzilla.suse.com/1200350", }, { category: "self", summary: "SUSE Bug 1200352", url: "https://bugzilla.suse.com/1200352", }, { category: "self", summary: "SUSE CVE CVE-2022-26377 page", url: "https://www.suse.com/security/cve/CVE-2022-26377/", }, { category: "self", summary: "SUSE CVE CVE-2022-28614 page", url: "https://www.suse.com/security/cve/CVE-2022-28614/", }, { category: "self", summary: "SUSE CVE CVE-2022-28615 page", url: "https://www.suse.com/security/cve/CVE-2022-28615/", }, { category: "self", summary: "SUSE CVE CVE-2022-29404 page", url: "https://www.suse.com/security/cve/CVE-2022-29404/", }, { category: "self", summary: "SUSE CVE CVE-2022-30522 page", url: "https://www.suse.com/security/cve/CVE-2022-30522/", }, { category: "self", summary: "SUSE CVE CVE-2022-30556 page", url: "https://www.suse.com/security/cve/CVE-2022-30556/", }, { category: "self", summary: "SUSE CVE CVE-2022-31813 page", url: "https://www.suse.com/security/cve/CVE-2022-31813/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2022-07-06T11:37:36Z", generator: { date: "2022-07-06T11:37:36Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2302-1", initial_release_date: "2022-07-06T11:37:36Z", revision_history: [ { date: "2022-07-06T11:37:36Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.51-150400.6.3.1.aarch64", product: { name: "apache2-2.4.51-150400.6.3.1.aarch64", product_id: "apache2-2.4.51-150400.6.3.1.aarch64", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150400.6.3.1.aarch64", product: { name: "apache2-devel-2.4.51-150400.6.3.1.aarch64", product_id: "apache2-devel-2.4.51-150400.6.3.1.aarch64", }, }, { category: "product_version", name: "apache2-event-2.4.51-150400.6.3.1.aarch64", product: { name: "apache2-event-2.4.51-150400.6.3.1.aarch64", product_id: "apache2-event-2.4.51-150400.6.3.1.aarch64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150400.6.3.1.aarch64", product: { name: "apache2-example-pages-2.4.51-150400.6.3.1.aarch64", product_id: "apache2-example-pages-2.4.51-150400.6.3.1.aarch64", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150400.6.3.1.aarch64", product: { name: "apache2-prefork-2.4.51-150400.6.3.1.aarch64", product_id: "apache2-prefork-2.4.51-150400.6.3.1.aarch64", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150400.6.3.1.aarch64", product: { name: "apache2-utils-2.4.51-150400.6.3.1.aarch64", product_id: "apache2-utils-2.4.51-150400.6.3.1.aarch64", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150400.6.3.1.aarch64", product: { name: "apache2-worker-2.4.51-150400.6.3.1.aarch64", product_id: "apache2-worker-2.4.51-150400.6.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-150400.6.3.1.i586", product: { name: "apache2-2.4.51-150400.6.3.1.i586", product_id: "apache2-2.4.51-150400.6.3.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150400.6.3.1.i586", product: { name: "apache2-devel-2.4.51-150400.6.3.1.i586", product_id: "apache2-devel-2.4.51-150400.6.3.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.51-150400.6.3.1.i586", product: { name: "apache2-event-2.4.51-150400.6.3.1.i586", product_id: "apache2-event-2.4.51-150400.6.3.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150400.6.3.1.i586", product: { name: "apache2-example-pages-2.4.51-150400.6.3.1.i586", product_id: "apache2-example-pages-2.4.51-150400.6.3.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150400.6.3.1.i586", product: { name: "apache2-prefork-2.4.51-150400.6.3.1.i586", product_id: "apache2-prefork-2.4.51-150400.6.3.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150400.6.3.1.i586", product: { name: "apache2-utils-2.4.51-150400.6.3.1.i586", product_id: "apache2-utils-2.4.51-150400.6.3.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150400.6.3.1.i586", product: { name: "apache2-worker-2.4.51-150400.6.3.1.i586", product_id: "apache2-worker-2.4.51-150400.6.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.51-150400.6.3.1.noarch", product: { name: "apache2-doc-2.4.51-150400.6.3.1.noarch", product_id: "apache2-doc-2.4.51-150400.6.3.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-150400.6.3.1.ppc64le", product: { name: "apache2-2.4.51-150400.6.3.1.ppc64le", product_id: "apache2-2.4.51-150400.6.3.1.ppc64le", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150400.6.3.1.ppc64le", product: { name: "apache2-devel-2.4.51-150400.6.3.1.ppc64le", product_id: "apache2-devel-2.4.51-150400.6.3.1.ppc64le", }, }, { category: "product_version", name: "apache2-event-2.4.51-150400.6.3.1.ppc64le", product: { name: "apache2-event-2.4.51-150400.6.3.1.ppc64le", product_id: "apache2-event-2.4.51-150400.6.3.1.ppc64le", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", product: { name: "apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", product_id: "apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150400.6.3.1.ppc64le", product: { name: "apache2-prefork-2.4.51-150400.6.3.1.ppc64le", product_id: "apache2-prefork-2.4.51-150400.6.3.1.ppc64le", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150400.6.3.1.ppc64le", product: { name: "apache2-utils-2.4.51-150400.6.3.1.ppc64le", product_id: "apache2-utils-2.4.51-150400.6.3.1.ppc64le", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150400.6.3.1.ppc64le", product: { name: "apache2-worker-2.4.51-150400.6.3.1.ppc64le", product_id: "apache2-worker-2.4.51-150400.6.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-150400.6.3.1.s390x", product: { name: "apache2-2.4.51-150400.6.3.1.s390x", product_id: "apache2-2.4.51-150400.6.3.1.s390x", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150400.6.3.1.s390x", product: { name: "apache2-devel-2.4.51-150400.6.3.1.s390x", product_id: "apache2-devel-2.4.51-150400.6.3.1.s390x", }, }, { category: "product_version", name: "apache2-event-2.4.51-150400.6.3.1.s390x", product: { name: "apache2-event-2.4.51-150400.6.3.1.s390x", product_id: "apache2-event-2.4.51-150400.6.3.1.s390x", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150400.6.3.1.s390x", product: { name: "apache2-example-pages-2.4.51-150400.6.3.1.s390x", product_id: "apache2-example-pages-2.4.51-150400.6.3.1.s390x", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150400.6.3.1.s390x", product: { name: "apache2-prefork-2.4.51-150400.6.3.1.s390x", product_id: "apache2-prefork-2.4.51-150400.6.3.1.s390x", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150400.6.3.1.s390x", product: { name: "apache2-utils-2.4.51-150400.6.3.1.s390x", product_id: "apache2-utils-2.4.51-150400.6.3.1.s390x", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150400.6.3.1.s390x", product: { name: "apache2-worker-2.4.51-150400.6.3.1.s390x", product_id: "apache2-worker-2.4.51-150400.6.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-150400.6.3.1.x86_64", product: { name: "apache2-2.4.51-150400.6.3.1.x86_64", product_id: "apache2-2.4.51-150400.6.3.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150400.6.3.1.x86_64", product: { name: "apache2-devel-2.4.51-150400.6.3.1.x86_64", product_id: "apache2-devel-2.4.51-150400.6.3.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.51-150400.6.3.1.x86_64", product: { name: "apache2-event-2.4.51-150400.6.3.1.x86_64", product_id: "apache2-event-2.4.51-150400.6.3.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150400.6.3.1.x86_64", product: { name: "apache2-example-pages-2.4.51-150400.6.3.1.x86_64", product_id: "apache2-example-pages-2.4.51-150400.6.3.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150400.6.3.1.x86_64", product: { name: "apache2-prefork-2.4.51-150400.6.3.1.x86_64", product_id: "apache2-prefork-2.4.51-150400.6.3.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150400.6.3.1.x86_64", product: { name: "apache2-utils-2.4.51-150400.6.3.1.x86_64", product_id: "apache2-utils-2.4.51-150400.6.3.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150400.6.3.1.x86_64", product: { name: "apache2-worker-2.4.51-150400.6.3.1.x86_64", product_id: "apache2-worker-2.4.51-150400.6.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Server Applications 15 SP4", product: { name: "SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-server-applications:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150400.6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150400.6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150400.6.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150400.6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150400.6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150400.6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150400.6.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-prefork-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150400.6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150400.6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-utils-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150400.6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150400.6.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-utils-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150400.6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150400.6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-event-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150400.6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-event-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150400.6.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-event-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150400.6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-event-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150400.6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-devel-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150400.6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-devel-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150400.6.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-devel-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150400.6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150400.6.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", }, product_reference: "apache2-doc-2.4.51-150400.6.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150400.6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-worker-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150400.6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150400.6.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-worker-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150400.6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150400.6.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150400.6.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150400.6.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150400.6.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150400.6.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-devel-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150400.6.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-devel-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150400.6.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-devel-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150400.6.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150400.6.3.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", }, product_reference: "apache2-doc-2.4.51-150400.6.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150400.6.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-event-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150400.6.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-event-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150400.6.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-event-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150400.6.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-event-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-150400.6.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-example-pages-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-150400.6.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-150400.6.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-example-pages-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-150400.6.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-example-pages-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150400.6.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150400.6.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150400.6.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-prefork-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150400.6.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150400.6.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-utils-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150400.6.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150400.6.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-utils-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150400.6.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150400.6.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", }, product_reference: "apache2-worker-2.4.51-150400.6.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150400.6.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-150400.6.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150400.6.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", }, product_reference: "apache2-worker-2.4.51-150400.6.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150400.6.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150400.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-26377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26377", }, ], notes: [ { category: "general", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26377", url: "https://www.suse.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "SUSE Bug 1200338 for CVE-2022-26377", url: "https://bugzilla.suse.com/1200338", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-06T11:37:36Z", details: "important", }, ], title: "CVE-2022-26377", }, { cve: "CVE-2022-28614", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28614", }, ], notes: [ { category: "general", text: "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28614", url: "https://www.suse.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "SUSE Bug 1200340 for CVE-2022-28614", url: "https://bugzilla.suse.com/1200340", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-06T11:37:36Z", details: "moderate", }, ], title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28615", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28615", url: "https://www.suse.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "SUSE Bug 1200341 for CVE-2022-28615", url: "https://bugzilla.suse.com/1200341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-06T11:37:36Z", details: "important", }, ], title: "CVE-2022-28615", }, { cve: "CVE-2022-29404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29404", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29404", url: "https://www.suse.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "SUSE Bug 1200345 for CVE-2022-29404", url: "https://bugzilla.suse.com/1200345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-06T11:37:36Z", details: "moderate", }, ], title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30522", }, ], notes: [ { category: "general", text: "If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30522", url: "https://www.suse.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "SUSE Bug 1200352 for CVE-2022-30522", url: "https://bugzilla.suse.com/1200352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-06T11:37:36Z", details: "moderate", }, ], title: "CVE-2022-30522", }, { cve: "CVE-2022-30556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30556", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30556", url: "https://www.suse.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "SUSE Bug 1200350 for CVE-2022-30556", url: "https://bugzilla.suse.com/1200350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-06T11:37:36Z", details: "moderate", }, ], title: "CVE-2022-30556", }, { cve: "CVE-2022-31813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31813", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31813", url: "https://www.suse.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "SUSE Bug 1200348 for CVE-2022-31813", url: "https://bugzilla.suse.com/1200348", }, { category: "external", summary: "SUSE Bug 1219585 for CVE-2022-31813", url: "https://bugzilla.suse.com/1219585", }, { category: "external", summary: "SUSE Bug 1225670 for CVE-2022-31813", url: "https://bugzilla.suse.com/1225670", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:apache2-event-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-doc-2.4.51-150400.6.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-worker-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-devel-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-doc-2.4.51-150400.6.3.1.noarch", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-event-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-example-pages-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-prefork-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-utils-2.4.51-150400.6.3.1.x86_64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.aarch64", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.ppc64le", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.s390x", "openSUSE Leap 15.4:apache2-worker-2.4.51-150400.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-06T11:37:36Z", details: "moderate", }, ], title: "CVE-2022-31813", }, ], }
suse-su-2022:2338-1
Vulnerability from csaf_suse
Published
2022-07-08 13:34
Modified
2022-07-08 13:34
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
Patchnames
SUSE-2022-2338,SUSE-SLE-Product-HPC-15-2022-2338,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2338,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2338,SUSE-SLE-Product-SLES-15-2022-2338,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2338,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2338,SUSE-SLE-Product-SLES_SAP-15-2022-2338,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2338,SUSE-Storage-6-2022-2338
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)\n- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)\n- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)\n- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)\n- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)\n- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)\n- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-2338,SUSE-SLE-Product-HPC-15-2022-2338,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2338,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2338,SUSE-SLE-Product-SLES-15-2022-2338,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2338,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2338,SUSE-SLE-Product-SLES_SAP-15-2022-2338,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2338,SUSE-Storage-6-2022-2338", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2338-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2338-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222338-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2338-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html", }, { category: "self", summary: "SUSE Bug 1200338", url: "https://bugzilla.suse.com/1200338", }, { category: "self", summary: "SUSE Bug 1200340", url: "https://bugzilla.suse.com/1200340", }, { category: "self", summary: "SUSE Bug 1200341", url: "https://bugzilla.suse.com/1200341", }, { category: "self", summary: "SUSE Bug 1200345", url: "https://bugzilla.suse.com/1200345", }, { category: "self", summary: "SUSE Bug 1200348", url: "https://bugzilla.suse.com/1200348", }, { category: "self", summary: "SUSE Bug 1200350", url: "https://bugzilla.suse.com/1200350", }, { category: "self", summary: "SUSE Bug 1200352", url: "https://bugzilla.suse.com/1200352", }, { category: "self", summary: "SUSE CVE CVE-2022-26377 page", url: "https://www.suse.com/security/cve/CVE-2022-26377/", }, { category: "self", summary: "SUSE CVE CVE-2022-28614 page", url: "https://www.suse.com/security/cve/CVE-2022-28614/", }, { category: "self", summary: "SUSE CVE CVE-2022-28615 page", url: "https://www.suse.com/security/cve/CVE-2022-28615/", }, { category: "self", summary: "SUSE CVE CVE-2022-29404 page", url: "https://www.suse.com/security/cve/CVE-2022-29404/", }, { category: "self", summary: "SUSE CVE CVE-2022-30522 page", url: "https://www.suse.com/security/cve/CVE-2022-30522/", }, { category: "self", summary: "SUSE CVE CVE-2022-30556 page", url: "https://www.suse.com/security/cve/CVE-2022-30556/", }, { category: "self", summary: "SUSE CVE CVE-2022-31813 page", url: "https://www.suse.com/security/cve/CVE-2022-31813/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2022-07-08T13:34:21Z", generator: { date: "2022-07-08T13:34:21Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2338-1", initial_release_date: "2022-07-08T13:34:21Z", revision_history: [ { date: "2022-07-08T13:34:21Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.33-150000.3.69.1.aarch64", product: { name: "apache2-2.4.33-150000.3.69.1.aarch64", product_id: "apache2-2.4.33-150000.3.69.1.aarch64", }, }, { category: "product_version", name: "apache2-devel-2.4.33-150000.3.69.1.aarch64", product: { name: "apache2-devel-2.4.33-150000.3.69.1.aarch64", product_id: "apache2-devel-2.4.33-150000.3.69.1.aarch64", }, }, { category: "product_version", name: "apache2-event-2.4.33-150000.3.69.1.aarch64", product: { name: "apache2-event-2.4.33-150000.3.69.1.aarch64", product_id: "apache2-event-2.4.33-150000.3.69.1.aarch64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-150000.3.69.1.aarch64", product: { name: "apache2-example-pages-2.4.33-150000.3.69.1.aarch64", product_id: "apache2-example-pages-2.4.33-150000.3.69.1.aarch64", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", product: { name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", product_id: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", }, }, { category: "product_version", name: "apache2-utils-2.4.33-150000.3.69.1.aarch64", product: { name: "apache2-utils-2.4.33-150000.3.69.1.aarch64", product_id: "apache2-utils-2.4.33-150000.3.69.1.aarch64", }, }, { category: "product_version", name: "apache2-worker-2.4.33-150000.3.69.1.aarch64", product: { name: "apache2-worker-2.4.33-150000.3.69.1.aarch64", product_id: "apache2-worker-2.4.33-150000.3.69.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-150000.3.69.1.i586", product: { name: "apache2-2.4.33-150000.3.69.1.i586", product_id: "apache2-2.4.33-150000.3.69.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.33-150000.3.69.1.i586", product: { name: "apache2-devel-2.4.33-150000.3.69.1.i586", product_id: "apache2-devel-2.4.33-150000.3.69.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.33-150000.3.69.1.i586", product: { name: "apache2-event-2.4.33-150000.3.69.1.i586", product_id: "apache2-event-2.4.33-150000.3.69.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-150000.3.69.1.i586", product: { name: "apache2-example-pages-2.4.33-150000.3.69.1.i586", product_id: "apache2-example-pages-2.4.33-150000.3.69.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-150000.3.69.1.i586", product: { name: "apache2-prefork-2.4.33-150000.3.69.1.i586", product_id: "apache2-prefork-2.4.33-150000.3.69.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.33-150000.3.69.1.i586", product: { name: "apache2-utils-2.4.33-150000.3.69.1.i586", product_id: "apache2-utils-2.4.33-150000.3.69.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.33-150000.3.69.1.i586", product: { name: "apache2-worker-2.4.33-150000.3.69.1.i586", product_id: "apache2-worker-2.4.33-150000.3.69.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.33-150000.3.69.1.noarch", product: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch", product_id: "apache2-doc-2.4.33-150000.3.69.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-150000.3.69.1.ppc64le", product: { name: "apache2-2.4.33-150000.3.69.1.ppc64le", product_id: "apache2-2.4.33-150000.3.69.1.ppc64le", }, }, { category: "product_version", name: "apache2-devel-2.4.33-150000.3.69.1.ppc64le", product: { name: "apache2-devel-2.4.33-150000.3.69.1.ppc64le", product_id: "apache2-devel-2.4.33-150000.3.69.1.ppc64le", }, }, { category: "product_version", name: "apache2-event-2.4.33-150000.3.69.1.ppc64le", product: { name: "apache2-event-2.4.33-150000.3.69.1.ppc64le", product_id: "apache2-event-2.4.33-150000.3.69.1.ppc64le", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-150000.3.69.1.ppc64le", product: { name: "apache2-example-pages-2.4.33-150000.3.69.1.ppc64le", product_id: "apache2-example-pages-2.4.33-150000.3.69.1.ppc64le", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le", product: { name: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le", product_id: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le", }, }, { category: "product_version", name: "apache2-utils-2.4.33-150000.3.69.1.ppc64le", product: { name: "apache2-utils-2.4.33-150000.3.69.1.ppc64le", product_id: "apache2-utils-2.4.33-150000.3.69.1.ppc64le", }, }, { category: "product_version", name: "apache2-worker-2.4.33-150000.3.69.1.ppc64le", product: { name: "apache2-worker-2.4.33-150000.3.69.1.ppc64le", product_id: "apache2-worker-2.4.33-150000.3.69.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-150000.3.69.1.s390x", product: { name: "apache2-2.4.33-150000.3.69.1.s390x", product_id: "apache2-2.4.33-150000.3.69.1.s390x", }, }, { category: "product_version", name: "apache2-devel-2.4.33-150000.3.69.1.s390x", product: { name: "apache2-devel-2.4.33-150000.3.69.1.s390x", product_id: "apache2-devel-2.4.33-150000.3.69.1.s390x", }, }, { category: "product_version", name: "apache2-event-2.4.33-150000.3.69.1.s390x", product: { name: "apache2-event-2.4.33-150000.3.69.1.s390x", product_id: "apache2-event-2.4.33-150000.3.69.1.s390x", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-150000.3.69.1.s390x", product: { name: "apache2-example-pages-2.4.33-150000.3.69.1.s390x", product_id: "apache2-example-pages-2.4.33-150000.3.69.1.s390x", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-150000.3.69.1.s390x", product: { name: "apache2-prefork-2.4.33-150000.3.69.1.s390x", product_id: "apache2-prefork-2.4.33-150000.3.69.1.s390x", }, }, { category: "product_version", name: "apache2-utils-2.4.33-150000.3.69.1.s390x", product: { name: "apache2-utils-2.4.33-150000.3.69.1.s390x", product_id: "apache2-utils-2.4.33-150000.3.69.1.s390x", }, }, { category: "product_version", name: "apache2-worker-2.4.33-150000.3.69.1.s390x", product: { name: "apache2-worker-2.4.33-150000.3.69.1.s390x", product_id: "apache2-worker-2.4.33-150000.3.69.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-150000.3.69.1.x86_64", product: { name: "apache2-2.4.33-150000.3.69.1.x86_64", product_id: "apache2-2.4.33-150000.3.69.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.33-150000.3.69.1.x86_64", product: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64", product_id: "apache2-devel-2.4.33-150000.3.69.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.33-150000.3.69.1.x86_64", product: { name: "apache2-event-2.4.33-150000.3.69.1.x86_64", product_id: "apache2-event-2.4.33-150000.3.69.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-150000.3.69.1.x86_64", product: { name: "apache2-example-pages-2.4.33-150000.3.69.1.x86_64", product_id: "apache2-example-pages-2.4.33-150000.3.69.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", product: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", product_id: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.33-150000.3.69.1.x86_64", product: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64", product_id: "apache2-utils-2.4.33-150000.3.69.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.33-150000.3.69.1.x86_64", product: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64", product_id: "apache2-worker-2.4.33-150000.3.69.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-150000.3.69.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-150000.3.69.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-devel-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-150000.3.69.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", }, product_reference: "apache2-doc-2.4.33-150000.3.69.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-150000.3.69.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-150000.3.69.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-utils-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-150000.3.69.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", }, product_reference: "apache2-worker-2.4.33-150000.3.69.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, ], }, vulnerabilities: [ { cve: "CVE-2022-26377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26377", }, ], notes: [ { category: "general", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26377", url: "https://www.suse.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "SUSE Bug 1200338 for CVE-2022-26377", url: "https://bugzilla.suse.com/1200338", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T13:34:21Z", details: "important", }, ], title: "CVE-2022-26377", }, { cve: "CVE-2022-28614", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28614", }, ], notes: [ { category: "general", text: "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28614", url: "https://www.suse.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "SUSE Bug 1200340 for CVE-2022-28614", url: "https://bugzilla.suse.com/1200340", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T13:34:21Z", details: "moderate", }, ], title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28615", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28615", url: "https://www.suse.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "SUSE Bug 1200341 for CVE-2022-28615", url: "https://bugzilla.suse.com/1200341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T13:34:21Z", details: "important", }, ], title: "CVE-2022-28615", }, { cve: "CVE-2022-29404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29404", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29404", url: "https://www.suse.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "SUSE Bug 1200345 for CVE-2022-29404", url: "https://bugzilla.suse.com/1200345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T13:34:21Z", details: "moderate", }, ], title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30522", }, ], notes: [ { category: "general", text: "If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30522", url: "https://www.suse.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "SUSE Bug 1200352 for CVE-2022-30522", url: "https://bugzilla.suse.com/1200352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T13:34:21Z", details: "moderate", }, ], title: "CVE-2022-30522", }, { cve: "CVE-2022-30556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30556", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30556", url: "https://www.suse.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "SUSE Bug 1200350 for CVE-2022-30556", url: "https://bugzilla.suse.com/1200350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T13:34:21Z", details: "moderate", }, ], title: "CVE-2022-30556", }, { cve: "CVE-2022-31813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31813", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31813", url: "https://www.suse.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "SUSE Bug 1200348 for CVE-2022-31813", url: "https://bugzilla.suse.com/1200348", }, { category: "external", summary: "SUSE Bug 1219585 for CVE-2022-31813", url: "https://bugzilla.suse.com/1219585", }, { category: "external", summary: "SUSE Bug 1225670 for CVE-2022-31813", url: "https://bugzilla.suse.com/1225670", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Enterprise Storage 6:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:apache2-worker-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-devel-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-doc-2.4.33-150000.3.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-prefork-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-utils-2.4.33-150000.3.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:apache2-worker-2.4.33-150000.3.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T13:34:21Z", details: "moderate", }, ], title: "CVE-2022-31813", }, ], }
suse-su-2022:2099-1
Vulnerability from csaf_suse
Published
2022-06-16 12:46
Modified
2022-06-16 12:46
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
Patchnames
HPE-Helion-OpenStack-8-2022-2099,SUSE-2022-2099,SUSE-OpenStack-Cloud-8-2022-2099,SUSE-OpenStack-Cloud-9-2022-2099,SUSE-OpenStack-Cloud-Crowbar-8-2022-2099,SUSE-OpenStack-Cloud-Crowbar-9-2022-2099,SUSE-SLE-SAP-12-SP3-2022-2099,SUSE-SLE-SAP-12-SP4-2022-2099,SUSE-SLE-SERVER-12-SP2-BCL-2022-2099,SUSE-SLE-SERVER-12-SP3-2022-2099,SUSE-SLE-SERVER-12-SP3-BCL-2022-2099,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2099
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)\n- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)\n- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)\n- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)\n- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)\n- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)\n- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)\n", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2022-2099,SUSE-2022-2099,SUSE-OpenStack-Cloud-8-2022-2099,SUSE-OpenStack-Cloud-9-2022-2099,SUSE-OpenStack-Cloud-Crowbar-8-2022-2099,SUSE-OpenStack-Cloud-Crowbar-9-2022-2099,SUSE-SLE-SAP-12-SP3-2022-2099,SUSE-SLE-SAP-12-SP4-2022-2099,SUSE-SLE-SERVER-12-SP2-BCL-2022-2099,SUSE-SLE-SERVER-12-SP3-2022-2099,SUSE-SLE-SERVER-12-SP3-BCL-2022-2099,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2099", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2099-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2099-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222099-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2099-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html", }, { category: "self", summary: "SUSE Bug 1200338", url: "https://bugzilla.suse.com/1200338", }, { category: "self", summary: "SUSE Bug 1200340", url: "https://bugzilla.suse.com/1200340", }, { category: "self", summary: "SUSE Bug 1200341", url: "https://bugzilla.suse.com/1200341", }, { category: "self", summary: "SUSE Bug 1200345", url: "https://bugzilla.suse.com/1200345", }, { category: "self", summary: "SUSE Bug 1200348", url: "https://bugzilla.suse.com/1200348", }, { category: "self", summary: "SUSE Bug 1200350", url: "https://bugzilla.suse.com/1200350", }, { category: "self", summary: "SUSE Bug 1200352", url: "https://bugzilla.suse.com/1200352", }, { category: "self", summary: "SUSE CVE CVE-2022-26377 page", url: "https://www.suse.com/security/cve/CVE-2022-26377/", }, { category: "self", summary: "SUSE CVE CVE-2022-28614 page", url: "https://www.suse.com/security/cve/CVE-2022-28614/", }, { category: "self", summary: "SUSE CVE CVE-2022-28615 page", url: "https://www.suse.com/security/cve/CVE-2022-28615/", }, { category: "self", summary: "SUSE CVE CVE-2022-29404 page", url: "https://www.suse.com/security/cve/CVE-2022-29404/", }, { category: "self", summary: "SUSE CVE CVE-2022-30522 page", url: "https://www.suse.com/security/cve/CVE-2022-30522/", }, { category: "self", summary: "SUSE CVE CVE-2022-30556 page", url: "https://www.suse.com/security/cve/CVE-2022-30556/", }, { category: "self", summary: "SUSE CVE CVE-2022-31813 page", url: "https://www.suse.com/security/cve/CVE-2022-31813/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2022-06-16T12:46:49Z", generator: { date: "2022-06-16T12:46:49Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2099-1", initial_release_date: "2022-06-16T12:46:49Z", revision_history: [ { date: "2022-06-16T12:46:49Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.23-29.91.1.aarch64", product: { name: "apache2-2.4.23-29.91.1.aarch64", product_id: "apache2-2.4.23-29.91.1.aarch64", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.91.1.aarch64", product: { name: "apache2-devel-2.4.23-29.91.1.aarch64", product_id: "apache2-devel-2.4.23-29.91.1.aarch64", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.91.1.aarch64", product: { name: "apache2-event-2.4.23-29.91.1.aarch64", product_id: "apache2-event-2.4.23-29.91.1.aarch64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.91.1.aarch64", product: { name: "apache2-example-pages-2.4.23-29.91.1.aarch64", product_id: "apache2-example-pages-2.4.23-29.91.1.aarch64", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.91.1.aarch64", product: { name: "apache2-prefork-2.4.23-29.91.1.aarch64", product_id: "apache2-prefork-2.4.23-29.91.1.aarch64", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.91.1.aarch64", product: { name: "apache2-utils-2.4.23-29.91.1.aarch64", product_id: "apache2-utils-2.4.23-29.91.1.aarch64", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.91.1.aarch64", product: { name: "apache2-worker-2.4.23-29.91.1.aarch64", product_id: "apache2-worker-2.4.23-29.91.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.91.1.i586", product: { name: "apache2-2.4.23-29.91.1.i586", product_id: "apache2-2.4.23-29.91.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.91.1.i586", product: { name: "apache2-devel-2.4.23-29.91.1.i586", product_id: "apache2-devel-2.4.23-29.91.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.91.1.i586", product: { name: "apache2-event-2.4.23-29.91.1.i586", product_id: "apache2-event-2.4.23-29.91.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.91.1.i586", product: { name: "apache2-example-pages-2.4.23-29.91.1.i586", product_id: "apache2-example-pages-2.4.23-29.91.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.91.1.i586", product: { name: "apache2-prefork-2.4.23-29.91.1.i586", product_id: "apache2-prefork-2.4.23-29.91.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.91.1.i586", product: { name: "apache2-utils-2.4.23-29.91.1.i586", product_id: "apache2-utils-2.4.23-29.91.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.91.1.i586", product: { name: "apache2-worker-2.4.23-29.91.1.i586", product_id: "apache2-worker-2.4.23-29.91.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.23-29.91.1.noarch", product: { name: "apache2-doc-2.4.23-29.91.1.noarch", product_id: "apache2-doc-2.4.23-29.91.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.91.1.ppc64le", product: { name: "apache2-2.4.23-29.91.1.ppc64le", product_id: "apache2-2.4.23-29.91.1.ppc64le", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.91.1.ppc64le", product: { name: "apache2-devel-2.4.23-29.91.1.ppc64le", product_id: "apache2-devel-2.4.23-29.91.1.ppc64le", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.91.1.ppc64le", product: { name: "apache2-event-2.4.23-29.91.1.ppc64le", product_id: "apache2-event-2.4.23-29.91.1.ppc64le", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.91.1.ppc64le", product: { name: "apache2-example-pages-2.4.23-29.91.1.ppc64le", product_id: "apache2-example-pages-2.4.23-29.91.1.ppc64le", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.91.1.ppc64le", product: { name: "apache2-prefork-2.4.23-29.91.1.ppc64le", product_id: "apache2-prefork-2.4.23-29.91.1.ppc64le", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.91.1.ppc64le", product: { name: "apache2-utils-2.4.23-29.91.1.ppc64le", product_id: "apache2-utils-2.4.23-29.91.1.ppc64le", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.91.1.ppc64le", product: { name: "apache2-worker-2.4.23-29.91.1.ppc64le", product_id: "apache2-worker-2.4.23-29.91.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.91.1.s390", product: { name: "apache2-2.4.23-29.91.1.s390", product_id: "apache2-2.4.23-29.91.1.s390", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.91.1.s390", product: { name: "apache2-devel-2.4.23-29.91.1.s390", product_id: "apache2-devel-2.4.23-29.91.1.s390", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.91.1.s390", product: { name: "apache2-event-2.4.23-29.91.1.s390", product_id: "apache2-event-2.4.23-29.91.1.s390", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.91.1.s390", product: { name: "apache2-example-pages-2.4.23-29.91.1.s390", product_id: "apache2-example-pages-2.4.23-29.91.1.s390", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.91.1.s390", product: { name: "apache2-prefork-2.4.23-29.91.1.s390", product_id: "apache2-prefork-2.4.23-29.91.1.s390", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.91.1.s390", product: { name: "apache2-utils-2.4.23-29.91.1.s390", product_id: "apache2-utils-2.4.23-29.91.1.s390", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.91.1.s390", product: { name: "apache2-worker-2.4.23-29.91.1.s390", product_id: "apache2-worker-2.4.23-29.91.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.91.1.s390x", product: { name: "apache2-2.4.23-29.91.1.s390x", product_id: "apache2-2.4.23-29.91.1.s390x", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.91.1.s390x", product: { name: "apache2-devel-2.4.23-29.91.1.s390x", product_id: "apache2-devel-2.4.23-29.91.1.s390x", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.91.1.s390x", product: { name: "apache2-event-2.4.23-29.91.1.s390x", product_id: "apache2-event-2.4.23-29.91.1.s390x", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.91.1.s390x", product: { name: "apache2-example-pages-2.4.23-29.91.1.s390x", product_id: "apache2-example-pages-2.4.23-29.91.1.s390x", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.91.1.s390x", product: { name: "apache2-prefork-2.4.23-29.91.1.s390x", product_id: "apache2-prefork-2.4.23-29.91.1.s390x", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.91.1.s390x", product: { name: "apache2-utils-2.4.23-29.91.1.s390x", product_id: "apache2-utils-2.4.23-29.91.1.s390x", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.91.1.s390x", product: { name: "apache2-worker-2.4.23-29.91.1.s390x", product_id: "apache2-worker-2.4.23-29.91.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.91.1.x86_64", product: { name: "apache2-2.4.23-29.91.1.x86_64", product_id: "apache2-2.4.23-29.91.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.91.1.x86_64", product: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64", product_id: "apache2-example-pages-2.4.23-29.91.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.91.1.x86_64", product: { name: "apache2-prefork-2.4.23-29.91.1.x86_64", product_id: "apache2-prefork-2.4.23-29.91.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.91.1.x86_64", product: { name: "apache2-utils-2.4.23-29.91.1.x86_64", product_id: "apache2-utils-2.4.23-29.91.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.91.1.x86_64", product: { name: "apache2-worker-2.4.23-29.91.1.x86_64", product_id: "apache2-worker-2.4.23-29.91.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.91.1.x86_64", product: { name: "apache2-devel-2.4.23-29.91.1.x86_64", product_id: "apache2-devel-2.4.23-29.91.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.91.1.x86_64", product: { name: "apache2-event-2.4.23-29.91.1.x86_64", product_id: "apache2-event-2.4.23-29.91.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", }, product_reference: "apache2-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", }, product_reference: "apache2-prefork-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-utils-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", }, product_reference: "apache2-utils-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-worker-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", }, product_reference: "apache2-worker-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", }, product_reference: "apache2-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.91.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.91.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", }, product_reference: "apache2-prefork-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-utils-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", }, product_reference: "apache2-utils-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", }, product_reference: "apache2-worker-2.4.23-29.91.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.91.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", }, product_reference: "apache2-worker-2.4.23-29.91.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.91.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-26377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26377", }, ], notes: [ { category: "general", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26377", url: "https://www.suse.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "SUSE Bug 1200338 for CVE-2022-26377", url: "https://bugzilla.suse.com/1200338", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:46:49Z", details: "important", }, ], title: "CVE-2022-26377", }, { cve: "CVE-2022-28614", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28614", }, ], notes: [ { category: "general", text: "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28614", url: "https://www.suse.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "SUSE Bug 1200340 for CVE-2022-28614", url: "https://bugzilla.suse.com/1200340", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:46:49Z", details: "moderate", }, ], title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28615", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28615", url: "https://www.suse.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "SUSE Bug 1200341 for CVE-2022-28615", url: "https://bugzilla.suse.com/1200341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:46:49Z", details: "important", }, ], title: "CVE-2022-28615", }, { cve: "CVE-2022-29404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29404", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29404", url: "https://www.suse.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "SUSE Bug 1200345 for CVE-2022-29404", url: "https://bugzilla.suse.com/1200345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:46:49Z", details: "moderate", }, ], title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30522", }, ], notes: [ { category: "general", text: "If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30522", url: "https://www.suse.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "SUSE Bug 1200352 for CVE-2022-30522", url: "https://bugzilla.suse.com/1200352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:46:49Z", details: "moderate", }, ], title: "CVE-2022-30522", }, { cve: "CVE-2022-30556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30556", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30556", url: "https://www.suse.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "SUSE Bug 1200350 for CVE-2022-30556", url: "https://bugzilla.suse.com/1200350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:46:49Z", details: "moderate", }, ], title: "CVE-2022-30556", }, { cve: "CVE-2022-31813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31813", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31813", url: "https://www.suse.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "SUSE Bug 1200348 for CVE-2022-31813", url: "https://bugzilla.suse.com/1200348", }, { category: "external", summary: "SUSE Bug 1219585 for CVE-2022-31813", url: "https://bugzilla.suse.com/1219585", }, { category: "external", summary: "SUSE Bug 1225670 for CVE-2022-31813", url: "https://bugzilla.suse.com/1225670", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:apache2-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-doc-2.4.23-29.91.1.noarch", "HPE Helion OpenStack 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-prefork-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-utils-2.4.23-29.91.1.x86_64", "HPE Helion OpenStack 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud 9:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 8:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:apache2-worker-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-doc-2.4.23-29.91.1.noarch", "SUSE OpenStack Cloud Crowbar 9:apache2-example-pages-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-prefork-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-utils-2.4.23-29.91.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:apache2-worker-2.4.23-29.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T12:46:49Z", details: "moderate", }, ], title: "CVE-2022-31813", }, ], }
suse-su-2022:2342-1
Vulnerability from csaf_suse
Published
2022-07-08 14:12
Modified
2022-07-08 14:12
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
Patchnames
SUSE-2022-2342,SUSE-SLE-Module-Basesystem-15-SP3-2022-2342,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2342,SUSE-SLE-Module-Server-Applications-15-SP3-2022-2342,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2342,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2342,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2342,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2342,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2342,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2342,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2342,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2342,SUSE-Storage-7-2022-2342,openSUSE-SLE-15.3-2022-2342
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n - CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)\n - CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)\n - CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)\n - CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)\n - CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)\n - CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)\n - CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-2342,SUSE-SLE-Module-Basesystem-15-SP3-2022-2342,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2342,SUSE-SLE-Module-Server-Applications-15-SP3-2022-2342,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2342,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2342,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2342,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2342,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2342,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2342,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2342,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2342,SUSE-Storage-7-2022-2342,openSUSE-SLE-15.3-2022-2342", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2342-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2342-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222342-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2342-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html", }, { category: "self", summary: "SUSE Bug 1200338", url: "https://bugzilla.suse.com/1200338", }, { category: "self", summary: "SUSE Bug 1200340", url: "https://bugzilla.suse.com/1200340", }, { category: "self", summary: "SUSE Bug 1200341", url: "https://bugzilla.suse.com/1200341", }, { category: "self", summary: "SUSE Bug 1200345", url: "https://bugzilla.suse.com/1200345", }, { category: "self", summary: "SUSE Bug 1200348", url: "https://bugzilla.suse.com/1200348", }, { category: "self", summary: "SUSE Bug 1200350", url: "https://bugzilla.suse.com/1200350", }, { category: "self", summary: "SUSE Bug 1200352", url: "https://bugzilla.suse.com/1200352", }, { category: "self", summary: "SUSE CVE CVE-2022-26377 page", url: "https://www.suse.com/security/cve/CVE-2022-26377/", }, { category: "self", summary: "SUSE CVE CVE-2022-28614 page", url: "https://www.suse.com/security/cve/CVE-2022-28614/", }, { category: "self", summary: "SUSE CVE CVE-2022-28615 page", url: "https://www.suse.com/security/cve/CVE-2022-28615/", }, { category: "self", summary: "SUSE CVE CVE-2022-29404 page", url: "https://www.suse.com/security/cve/CVE-2022-29404/", }, { category: "self", summary: "SUSE CVE CVE-2022-30522 page", url: "https://www.suse.com/security/cve/CVE-2022-30522/", }, { category: "self", summary: "SUSE CVE CVE-2022-30556 page", url: "https://www.suse.com/security/cve/CVE-2022-30556/", }, { category: "self", summary: "SUSE CVE CVE-2022-31813 page", url: "https://www.suse.com/security/cve/CVE-2022-31813/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2022-07-08T14:12:34Z", generator: { date: "2022-07-08T14:12:34Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2342-1", initial_release_date: "2022-07-08T14:12:34Z", revision_history: [ { date: "2022-07-08T14:12:34Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.51-150200.3.48.1.aarch64", product: { name: "apache2-2.4.51-150200.3.48.1.aarch64", product_id: "apache2-2.4.51-150200.3.48.1.aarch64", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150200.3.48.1.aarch64", product: { name: "apache2-devel-2.4.51-150200.3.48.1.aarch64", product_id: "apache2-devel-2.4.51-150200.3.48.1.aarch64", }, }, { category: "product_version", name: "apache2-event-2.4.51-150200.3.48.1.aarch64", product: { name: "apache2-event-2.4.51-150200.3.48.1.aarch64", product_id: "apache2-event-2.4.51-150200.3.48.1.aarch64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150200.3.48.1.aarch64", product: { name: "apache2-example-pages-2.4.51-150200.3.48.1.aarch64", product_id: "apache2-example-pages-2.4.51-150200.3.48.1.aarch64", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", product: { name: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", product_id: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150200.3.48.1.aarch64", product: { name: "apache2-utils-2.4.51-150200.3.48.1.aarch64", product_id: "apache2-utils-2.4.51-150200.3.48.1.aarch64", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150200.3.48.1.aarch64", product: { name: "apache2-worker-2.4.51-150200.3.48.1.aarch64", product_id: "apache2-worker-2.4.51-150200.3.48.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-150200.3.48.1.i586", product: { name: "apache2-2.4.51-150200.3.48.1.i586", product_id: "apache2-2.4.51-150200.3.48.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150200.3.48.1.i586", product: { name: "apache2-devel-2.4.51-150200.3.48.1.i586", product_id: "apache2-devel-2.4.51-150200.3.48.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.51-150200.3.48.1.i586", product: { name: "apache2-event-2.4.51-150200.3.48.1.i586", product_id: "apache2-event-2.4.51-150200.3.48.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150200.3.48.1.i586", product: { name: "apache2-example-pages-2.4.51-150200.3.48.1.i586", product_id: "apache2-example-pages-2.4.51-150200.3.48.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150200.3.48.1.i586", product: { name: "apache2-prefork-2.4.51-150200.3.48.1.i586", product_id: "apache2-prefork-2.4.51-150200.3.48.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150200.3.48.1.i586", product: { name: "apache2-utils-2.4.51-150200.3.48.1.i586", product_id: "apache2-utils-2.4.51-150200.3.48.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150200.3.48.1.i586", product: { name: "apache2-worker-2.4.51-150200.3.48.1.i586", product_id: "apache2-worker-2.4.51-150200.3.48.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.51-150200.3.48.1.noarch", product: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch", product_id: "apache2-doc-2.4.51-150200.3.48.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-150200.3.48.1.ppc64le", product: { name: "apache2-2.4.51-150200.3.48.1.ppc64le", product_id: "apache2-2.4.51-150200.3.48.1.ppc64le", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150200.3.48.1.ppc64le", product: { name: "apache2-devel-2.4.51-150200.3.48.1.ppc64le", product_id: "apache2-devel-2.4.51-150200.3.48.1.ppc64le", }, }, { category: "product_version", name: "apache2-event-2.4.51-150200.3.48.1.ppc64le", product: { name: "apache2-event-2.4.51-150200.3.48.1.ppc64le", product_id: "apache2-event-2.4.51-150200.3.48.1.ppc64le", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", product: { name: "apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", product_id: "apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le", product: { name: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le", product_id: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150200.3.48.1.ppc64le", product: { name: "apache2-utils-2.4.51-150200.3.48.1.ppc64le", product_id: "apache2-utils-2.4.51-150200.3.48.1.ppc64le", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150200.3.48.1.ppc64le", product: { name: "apache2-worker-2.4.51-150200.3.48.1.ppc64le", product_id: "apache2-worker-2.4.51-150200.3.48.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-150200.3.48.1.s390x", product: { name: "apache2-2.4.51-150200.3.48.1.s390x", product_id: "apache2-2.4.51-150200.3.48.1.s390x", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150200.3.48.1.s390x", product: { name: "apache2-devel-2.4.51-150200.3.48.1.s390x", product_id: "apache2-devel-2.4.51-150200.3.48.1.s390x", }, }, { category: "product_version", name: "apache2-event-2.4.51-150200.3.48.1.s390x", product: { name: "apache2-event-2.4.51-150200.3.48.1.s390x", product_id: "apache2-event-2.4.51-150200.3.48.1.s390x", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150200.3.48.1.s390x", product: { name: "apache2-example-pages-2.4.51-150200.3.48.1.s390x", product_id: "apache2-example-pages-2.4.51-150200.3.48.1.s390x", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150200.3.48.1.s390x", product: { name: "apache2-prefork-2.4.51-150200.3.48.1.s390x", product_id: "apache2-prefork-2.4.51-150200.3.48.1.s390x", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150200.3.48.1.s390x", product: { name: "apache2-utils-2.4.51-150200.3.48.1.s390x", product_id: "apache2-utils-2.4.51-150200.3.48.1.s390x", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150200.3.48.1.s390x", product: { name: "apache2-worker-2.4.51-150200.3.48.1.s390x", product_id: "apache2-worker-2.4.51-150200.3.48.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.51-150200.3.48.1.x86_64", product: { name: "apache2-2.4.51-150200.3.48.1.x86_64", product_id: "apache2-2.4.51-150200.3.48.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.51-150200.3.48.1.x86_64", product: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64", product_id: "apache2-devel-2.4.51-150200.3.48.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.51-150200.3.48.1.x86_64", product: { name: "apache2-event-2.4.51-150200.3.48.1.x86_64", product_id: "apache2-event-2.4.51-150200.3.48.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.51-150200.3.48.1.x86_64", product: { name: "apache2-example-pages-2.4.51-150200.3.48.1.x86_64", product_id: "apache2-example-pages-2.4.51-150200.3.48.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", product: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", product_id: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.51-150200.3.48.1.x86_64", product: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64", product_id: "apache2-utils-2.4.51-150200.3.48.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.51-150200.3.48.1.x86_64", product: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64", product_id: "apache2-worker-2.4.51-150200.3.48.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Server Applications 15 SP3", product: { name: "SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-server-applications:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-event-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-event-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-event-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-event-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.51-150200.3.48.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.51-150200.3.48.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-devel-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.51-150200.3.48.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", }, product_reference: "apache2-doc-2.4.51-150200.3.48.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150200.3.48.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-event-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150200.3.48.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-event-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150200.3.48.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-event-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.51-150200.3.48.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-event-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-150200.3.48.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-example-pages-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-150200.3.48.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-150200.3.48.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-example-pages-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.51-150200.3.48.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-example-pages-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.51-150200.3.48.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-prefork-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.51-150200.3.48.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-utils-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.51-150200.3.48.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", }, product_reference: "apache2-worker-2.4.51-150200.3.48.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2022-26377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26377", }, ], notes: [ { category: "general", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26377", url: "https://www.suse.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "SUSE Bug 1200338 for CVE-2022-26377", url: "https://bugzilla.suse.com/1200338", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T14:12:34Z", details: "important", }, ], title: "CVE-2022-26377", }, { cve: "CVE-2022-28614", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28614", }, ], notes: [ { category: "general", text: "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28614", url: "https://www.suse.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "SUSE Bug 1200340 for CVE-2022-28614", url: "https://bugzilla.suse.com/1200340", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T14:12:34Z", details: "moderate", }, ], title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28615", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28615", url: "https://www.suse.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "SUSE Bug 1200341 for CVE-2022-28615", url: "https://bugzilla.suse.com/1200341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T14:12:34Z", details: "important", }, ], title: "CVE-2022-28615", }, { cve: "CVE-2022-29404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29404", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29404", url: "https://www.suse.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "SUSE Bug 1200345 for CVE-2022-29404", url: "https://bugzilla.suse.com/1200345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T14:12:34Z", details: "moderate", }, ], title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30522", }, ], notes: [ { category: "general", text: "If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30522", url: "https://www.suse.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "SUSE Bug 1200352 for CVE-2022-30522", url: "https://bugzilla.suse.com/1200352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T14:12:34Z", details: "moderate", }, ], title: "CVE-2022-30522", }, { cve: "CVE-2022-30556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30556", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30556", url: "https://www.suse.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "SUSE Bug 1200350 for CVE-2022-30556", url: "https://bugzilla.suse.com/1200350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T14:12:34Z", details: "moderate", }, ], title: "CVE-2022-30556", }, { cve: "CVE-2022-31813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31813", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31813", url: "https://www.suse.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "SUSE Bug 1200348 for CVE-2022-31813", url: "https://bugzilla.suse.com/1200348", }, { category: "external", summary: "SUSE Bug 1219585 for CVE-2022-31813", url: "https://bugzilla.suse.com/1219585", }, { category: "external", summary: "SUSE Bug 1225670 for CVE-2022-31813", url: "https://bugzilla.suse.com/1225670", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Enterprise Storage 7:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:apache2-event-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP3:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Proxy 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Proxy 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Retail Branch Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Retail Branch Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-devel-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-doc-2.4.51-150200.3.48.1.noarch", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-utils-2.4.51-150200.3.48.1.x86_64", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.s390x", "SUSE Manager Server 4.1:apache2-worker-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.48.1.noarch", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.48.1.x86_64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.aarch64", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.ppc64le", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.s390x", "openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.48.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-07-08T14:12:34Z", details: "moderate", }, ], title: "CVE-2022-31813", }, ], }
ghsa-jq5m-vpg7-ghpv
Vulnerability from github
Published
2022-06-10 00:00
Modified
2022-06-17 00:01
Severity ?
Details
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
{ affected: [], aliases: [ "CVE-2022-29404", ], database_specific: { cwe_ids: [ "CWE-770", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-06-09T17:15:00Z", severity: "HIGH", }, details: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", id: "GHSA-jq5m-vpg7-ghpv", modified: "2022-06-17T00:01:28Z", published: "2022-06-10T00:00:55Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", }, { type: "WEB", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202208-20", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20220624-0005", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/06/08/5", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
WID-SEC-W-2022-0192
Vulnerability from csaf_certbund
Published
2022-06-07 22:00
Modified
2024-03-26 23:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um falsche Informationen darzustellen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herzustellen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- F5 Networks
- Hardware Appliance
- Linux
- NetApp Appliance
- Sonstiges
- UNIX
- Windows
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apache ist ein Webserver für verschiedene Plattformen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um falsche Informationen darzustellen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herzustellen und Sicherheitsmaßnahmen zu umgehen.", title: "Angriff", }, { category: "general", text: "- F5 Networks\n- Hardware Appliance\n- Linux\n- NetApp Appliance\n- Sonstiges\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0192 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0192.json", }, { category: "self", summary: "WID-SEC-2022-0192 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0192", }, { category: "external", summary: "Ubuntu Security Notice USN-5487-1 vom 2022-06-21", url: "https://ubuntu.com/security/notices/USN-5487-1", }, { category: "external", summary: "Apache Security Advisory vom 2022-06-07", url: "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.54", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2099-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2101-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html", }, { category: "external", summary: "IBM Security Bulletin 6595149 vom 2022-06-16", url: "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-http-server-used-by-ibm-websphere-application-server-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-5487-2 vom 2022-06-23", url: "https://ubuntu.com/security/notices/USN-5487-2", }, { category: "external", summary: "Ubuntu Security Notice USN-5487-3 vom 2022-06-24", url: "https://ubuntu.com/security/notices/USN-5487-3", }, { category: "external", summary: "F5 Security Advisory K58003591 vom 2022-07-05", url: "https://support.f5.com/csp/article/K58003591", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2302-1 vom 2022-07-06", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1607 vom 2022-07-07", url: "https://alas.aws.amazon.com/ALAS-2022-1607.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2342-1 vom 2022-07-08", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2338-1 vom 2022-07-08", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html", }, { category: "external", summary: "F5 Security Advisory K40582331 vom 2022-07-08", url: "https://support.f5.com/csp/article/K40582331", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1812 vom 2022-07-15", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1812.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-110 vom 2022-07-21", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-110.html", }, { category: "external", summary: "NetApp Security Advisory NTAP-20220624-0005 vom 2022-07-27", url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9675 vom 2022-08-04", url: "http://linux.oracle.com/errata/ELSA-2022-9675.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9676 vom 2022-08-04", url: "http://linux.oracle.com/errata/ELSA-2022-9676.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9680 vom 2022-08-05", url: "http://linux.oracle.com/errata/ELSA-2022-9680.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9682 vom 2022-08-11", url: "https://linux.oracle.com/errata/ELSA-2022-9682.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-20 vom 2022-08-14", url: "https://security.gentoo.org/glsa/202208-20", }, { category: "external", summary: "QNAP Security Advisory QSA-22-23 vom 2022-08-15", url: "https://www.qnap.com/de-de/security-advisory/QSA-22-23", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9714 vom 2022-08-17", url: "http://linux.oracle.com/errata/ELSA-2022-9714.html", }, { category: "external", summary: "HCL Article KB0100505 vom 2022-09-21", url: "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0100505", }, { category: "external", summary: "baramundi Sicherheitsupdate S-2022-01 vom 2022-09-27", url: "https://www.baramundi.com/de-de/security-info/s-2022-01/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6753 vom 2022-09-29", url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-202 vom 2022-11-04", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-202.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:7647 vom 2022-11-08", url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:8067 vom 2022-11-15", url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-7647 vom 2022-11-15", url: "https://linux.oracle.com/errata/ELSA-2022-7647.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-8067 vom 2022-11-22", url: "https://linux.oracle.com/errata/ELSA-2022-8067.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:8840 vom 2022-12-08", url: "https://access.redhat.com/errata/RHSA-2022:8840", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:8841 vom 2022-12-08", url: "https://access.redhat.com/errata/RHSA-2022:8841", }, { category: "external", summary: "IBM Security Bulletin 6595149 abgerufen am 2023-02-17", url: "https://www.ibm.com/support/pages/node/6595149", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-1593 vom 2023-04-05", url: "https://linux.oracle.com/errata/ELSA-2023-1593.html", }, { category: "external", summary: "F5 Security Advisory K26314875 vom 2023-04-06", url: "https://my.f5.com/manage/s/article/K26314875", }, { category: "external", summary: "F5 Security Advisory K40582331 vom 2023-06-22", url: "https://my.f5.com/manage/s/article/K40582331", }, { category: "external", summary: "HPE Securi+y Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us", }, { category: "external", summary: "IBM Security Bulletin 7063718 vom 2023-10-31", url: "https://www.ibm.com/support/pages/node/7063718", }, { category: "external", summary: "IBM Security Bulletin 7145265 vom 2024-03-26", url: "https://www.ibm.com/support/pages/node/7145265", }, ], source_lang: "en-US", title: "Apache HTTP Server: Mehrere Schwachstellen", tracking: { current_release_date: "2024-03-26T23:00:00.000+00:00", generator: { date: "2024-08-15T17:27:11.815+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0192", initial_release_date: "2022-06-07T22:00:00.000+00:00", revision_history: [ { date: "2022-06-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-06-16T22:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE und IBM aufgenommen", }, { date: "2022-06-21T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-22T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-23T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-07-05T22:00:00.000+00:00", number: "6", summary: "F5 stellt neue Informationen bereit", }, { date: "2022-07-06T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-07T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-10T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE und Informationen von F5 aufgenommen", }, { date: "2022-07-14T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-21T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-27T22:00:00.000+00:00", number: "12", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2022-08-04T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-08-07T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-08-10T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-08-14T22:00:00.000+00:00", number: "16", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-08-15T22:00:00.000+00:00", number: "17", summary: "Neue Updates von QNAP aufgenommen", }, { date: "2022-08-17T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-09-20T22:00:00.000+00:00", number: "19", summary: "Neue Updates von HCL aufgenommen", }, { date: "2022-09-27T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Baramundi aufgenommen", }, { date: "2022-09-29T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-11-06T23:00:00.000+00:00", number: "22", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-11-08T23:00:00.000+00:00", number: "23", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-11-15T23:00:00.000+00:00", number: "24", summary: "Neue Updates von Red Hat und Oracle Linux aufgenommen", }, { date: "2022-11-21T23:00:00.000+00:00", number: "25", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-12-08T23:00:00.000+00:00", number: "26", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-02-16T23:00:00.000+00:00", number: "27", summary: "Aktualisierung IBM Link wg. nicht mehr erreichbarer URL, Ergänzung Produktliste dazu", }, { date: "2023-04-04T22:00:00.000+00:00", number: "28", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2023-04-10T22:00:00.000+00:00", number: "29", summary: "Neue Updates von F5 aufgenommen", }, { date: "2023-06-22T22:00:00.000+00:00", number: "30", summary: "Neue Updates von F5 aufgenommen", }, { date: "2023-08-13T22:00:00.000+00:00", number: "31", summary: "Neue Updates von HP aufgenommen", }, { date: "2023-10-31T23:00:00.000+00:00", number: "32", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-03-26T23:00:00.000+00:00", number: "33", summary: "Neue Updates von IBM aufgenommen", }, ], status: "final", version: "33", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { branches: [ { category: "product_version_range", name: "< 2.4.54", product: { name: "Apache HTTP Server < 2.4.54", product_id: "T023434", }, }, ], category: "product_name", name: "HTTP Server", }, ], category: "vendor", name: "Apache", }, { branches: [ { category: "product_name", name: "Baramundi Management Suite", product: { name: "Baramundi Management Suite", product_id: "T024720", product_identification_helper: { cpe: "cpe:/a:baramundi:management_suite:-", }, }, }, ], category: "vendor", name: "Baramundi", }, { branches: [ { category: "product_name", name: "Broadcom Brocade Switch", product: { name: "Broadcom Brocade Switch", product_id: "T015844", product_identification_helper: { cpe: "cpe:/h:brocade:switch:-", }, }, }, ], category: "vendor", name: "Broadcom", }, { branches: [ { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, { category: "product_version_range", name: "< 15.1.9", product: { name: "F5 BIG-IP < 15.1.9", product_id: "T028287", }, }, ], category: "product_name", name: "BIG-IP", }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "HCL Commerce", product: { name: "HCL Commerce", product_id: "T019293", product_identification_helper: { cpe: "cpe:/a:hcltechsw:commerce:-", }, }, }, ], category: "vendor", name: "HCL", }, { branches: [ { category: "product_name", name: "HPE Switch", product: { name: "HPE Switch", product_id: "T005119", product_identification_helper: { cpe: "cpe:/h:hp:switch:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { branches: [ { category: "product_version", name: "8.5", product: { name: "IBM HTTP Server 8.5", product_id: "T001650", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:8.5", }, }, }, { category: "product_version", name: "7", product: { name: "IBM HTTP Server 7.0", product_id: "T003674", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:7.0", }, }, }, { category: "product_version", name: "8", product: { name: "IBM HTTP Server 8.0", product_id: "T003675", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:8.0", }, }, }, { category: "product_name", name: "IBM HTTP Server", product: { name: "IBM HTTP Server", product_id: "T004019", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:-", }, }, }, { category: "product_version", name: "9", product: { name: "IBM HTTP Server 9.0", product_id: "T008162", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:9.0", }, }, }, ], category: "product_name", name: "HTTP Server", }, { branches: [ { category: "product_version_range", name: "< 7.5.0 UP8", product: { name: "IBM QRadar SIEM < 7.5.0 UP8", product_id: "T033681", }, }, ], category: "product_name", name: "QRadar SIEM", }, { branches: [ { category: "product_version_range", name: "< 8.0.0.24", product: { name: "IBM Rational Build Forge < 8.0.0.24", product_id: "T030689", }, }, ], category: "product_name", name: "Rational Build Forge", }, { category: "product_name", name: "IBM WebSphere Application Server", product: { name: "IBM WebSphere Application Server", product_id: "5198", product_identification_helper: { cpe: "cpe:/a:ibm:websphere_application_server:-", }, }, }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "NetApp Data ONTAP", product: { name: "NetApp Data ONTAP", product_id: "7654", product_identification_helper: { cpe: "cpe:/a:netapp:data_ontap:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "QNAP NAS", product: { name: "QNAP NAS", product_id: "T017100", product_identification_helper: { cpe: "cpe:/h:qnap:nas:-", }, }, }, ], category: "vendor", name: "QNAP", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-26377", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund einer unsachgemäßen Validierung von HTTP-Anfragen in mod_proxy_ajp. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um HTTP-Request-Schmuggel-Angriffe durchzuführen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-26377", }, { cve: "CVE-2022-28330", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-28330", }, { cve: "CVE-2022-28614", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-28615", }, { cve: "CVE-2022-30556", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-30556", }, { cve: "CVE-2022-29404", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Eingabevalidierungsfehlers und einer Ressourcenerschöpfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Eingabevalidierungsfehlers und einer Ressourcenerschöpfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-30522", }, { cve: "CVE-2022-31813", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund eines Fehlers in der mod_proxy-Implementierung, bei dem der Webserver möglicherweise die X-Forwarded-*-Header nicht an den Ursprungsserver sendet, basierend auf dem clientseitigen Connection-Header-Hop-by-Hop-Mechanismus. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsmaßnahmen zu umgehen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-31813", }, ], }
wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Published
2024-07-10 22:00
Modified
2024-11-11 23:00
Summary
Juniper JUNOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
JUNOS ist das "Juniper Network Operating System", das in Juniper Appliances verwendet wird.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1591 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json", }, { category: "self", summary: "WID-SEC-2024-1591 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591", }, { category: "external", summary: "Juniper Patchday July 2024 vom 2024-07-10", url: "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending&numberOfResults=100&f:ctype=%5BSecurity%20Advisories%5D", }, ], source_lang: "en-US", title: "Juniper JUNOS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-11T23:00:00.000+00:00", generator: { date: "2024-11-12T09:31:28.569+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-1591", initial_release_date: "2024-07-10T22:00:00.000+00:00", revision_history: [ { date: "2024-07-10T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-11T23:00:00.000+00:00", number: "2", summary: "URL Kodierung angepasst", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Juniper JUNOS", product: { name: "Juniper JUNOS", product_id: "T036093", product_identification_helper: { cpe: "cpe:/o:juniper:junos:-", }, }, }, ], category: "vendor", name: "Juniper", }, ], }, vulnerabilities: [ { cve: "CVE-2006-20001", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2006-20001", }, { cve: "CVE-2007-5846", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2007-5846", }, { cve: "CVE-2008-6123", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2008-6123", }, { cve: "CVE-2011-1473", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2011-1473", }, { cve: "CVE-2011-5094", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2011-5094", }, { cve: "CVE-2012-6151", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2012-6151", }, { cve: "CVE-2014-10064", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2014-10064", }, { cve: "CVE-2014-2285", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2014-2285", }, { cve: "CVE-2014-2310", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2014-2310", }, { cve: "CVE-2014-3565", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2014-3565", }, { cve: "CVE-2014-7191", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2014-7191", }, { cve: "CVE-2014-8882", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2014-8882", }, { cve: "CVE-2015-5621", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2015-5621", }, { cve: "CVE-2015-8100", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2015-8100", }, { cve: "CVE-2015-9262", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2015-9262", }, { cve: "CVE-2016-1000232", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2016-1000232", }, { cve: "CVE-2016-10540", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2016-10540", }, { cve: "CVE-2016-4658", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2016-4658", }, { cve: "CVE-2017-1000048", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2017-1000048", }, { cve: "CVE-2017-15010", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2017-15010", }, { cve: "CVE-2018-18065", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2018-18065", }, { cve: "CVE-2018-20834", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2018-20834", }, { cve: "CVE-2018-3737", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2018-3737", }, { cve: "CVE-2018-7408", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2018-7408", }, { cve: "CVE-2019-10081", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-10081", }, { cve: "CVE-2019-10082", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-10082", }, { cve: "CVE-2019-10092", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-10092", }, { cve: "CVE-2019-10097", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-10097", }, { cve: "CVE-2019-10098", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-10098", }, { cve: "CVE-2019-11719", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-11719", }, { cve: "CVE-2019-11727", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-11727", }, { cve: "CVE-2019-11756", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-11756", }, { cve: "CVE-2019-16775", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-16775", }, { cve: "CVE-2019-16776", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-16776", }, { cve: "CVE-2019-16777", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-16777", }, { cve: "CVE-2019-17006", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-17006", }, { cve: "CVE-2019-17023", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-17023", }, { cve: "CVE-2019-17567", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-17567", }, { cve: "CVE-2019-20149", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-20149", }, { cve: "CVE-2019-20892", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-20892", }, { cve: "CVE-2019-9517", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2019-9517", }, { cve: "CVE-2020-11668", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-11668", }, { cve: "CVE-2020-11984", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-11984", }, { cve: "CVE-2020-11993", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-11993", }, { cve: "CVE-2020-12362", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-12362", }, { cve: "CVE-2020-12400", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-12400", }, { cve: "CVE-2020-12401", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-12401", }, { cve: "CVE-2020-12402", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-12402", }, { cve: "CVE-2020-12403", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-12403", }, { cve: "CVE-2020-13938", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-13938", }, { cve: "CVE-2020-13950", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-13950", }, { cve: "CVE-2020-14145", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-14145", }, { cve: "CVE-2020-15861", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-15861", }, { cve: "CVE-2020-15862", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-15862", }, { cve: "CVE-2020-1927", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-1927", }, { cve: "CVE-2020-1934", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-1934", }, { cve: "CVE-2020-28469", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-28469", }, { cve: "CVE-2020-28502", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-28502", }, { cve: "CVE-2020-35452", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-35452", }, { cve: "CVE-2020-36049", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-36049", }, { cve: "CVE-2020-6829", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-6829", }, { cve: "CVE-2020-7660", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-7660", }, { cve: "CVE-2020-7754", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-7754", }, { cve: "CVE-2020-7774", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-7774", }, { cve: "CVE-2020-8648", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-8648", }, { cve: "CVE-2020-9490", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2020-9490", }, { cve: "CVE-2021-22543", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-22543", }, { cve: "CVE-2021-2342", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-2342", }, { cve: "CVE-2021-23440", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-23440", }, { cve: "CVE-2021-2356", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-2356", }, { cve: "CVE-2021-2372", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-2372", }, { cve: "CVE-2021-2385", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-2385", }, { cve: "CVE-2021-2389", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-2389", }, { cve: "CVE-2021-2390", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-2390", }, { cve: "CVE-2021-25745", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-25745", }, { cve: "CVE-2021-25746", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-25746", }, { cve: "CVE-2021-25748", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-25748", }, { cve: "CVE-2021-26690", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-26690", }, { cve: "CVE-2021-26691", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-26691", }, { cve: "CVE-2021-27290", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-27290", }, { cve: "CVE-2021-29469", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-29469", }, { cve: "CVE-2021-30641", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-30641", }, { cve: "CVE-2021-31535", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-31535", }, { cve: "CVE-2021-31618", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-31618", }, { cve: "CVE-2021-3177", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-3177", }, { cve: "CVE-2021-32803", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-32803", }, { cve: "CVE-2021-32804", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-32804", }, { cve: "CVE-2021-33033", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-33033", }, { cve: "CVE-2021-33034", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-33034", }, { cve: "CVE-2021-33193", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-33193", }, { cve: "CVE-2021-3347", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-3347", }, { cve: "CVE-2021-33909", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-33909", }, { cve: "CVE-2021-34798", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-34798", }, { cve: "CVE-2021-35604", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-35604", }, { cve: "CVE-2021-35624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-35624", }, { cve: "CVE-2021-36160", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-36160", }, { cve: "CVE-2021-37701", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-37713", }, { cve: "CVE-2021-3803", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-3803", }, { cve: "CVE-2021-39275", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-39275", }, { cve: "CVE-2021-40438", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-40438", }, { cve: "CVE-2021-41524", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-41524", }, { cve: "CVE-2021-41773", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-41773", }, { cve: "CVE-2021-42013", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-42013", }, { cve: "CVE-2021-43527", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-43527", }, { cve: "CVE-2021-44224", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-44224", }, { cve: "CVE-2021-44225", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-44225", }, { cve: "CVE-2021-44790", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-44790", }, { cve: "CVE-2021-44906", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2021-44906", }, { cve: "CVE-2022-21245", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21245", }, { cve: "CVE-2022-21270", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21270", }, { cve: "CVE-2022-21303", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21303", }, { cve: "CVE-2022-21304", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21304", }, { cve: "CVE-2022-21344", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21344", }, { cve: "CVE-2022-21367", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21367", }, { cve: "CVE-2022-21417", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21417", }, { cve: "CVE-2022-21427", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21427", }, { cve: "CVE-2022-21444", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21444", }, { cve: "CVE-2022-21451", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21451", }, { cve: "CVE-2022-21454", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21454", }, { cve: "CVE-2022-21460", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21460", }, { cve: "CVE-2022-21589", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21589", }, { cve: "CVE-2022-21592", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21592", }, { cve: "CVE-2022-21595", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21595", }, { cve: "CVE-2022-21608", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21608", }, { cve: "CVE-2022-21617", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-21617", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23524", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-23524", }, { cve: "CVE-2022-23525", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-23525", }, { cve: "CVE-2022-23526", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-23526", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-2526", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-2526", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-26377", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-26377", }, { cve: "CVE-2022-28330", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-28330", }, { cve: "CVE-2022-28614", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-28615", }, { cve: "CVE-2022-29167", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-29167", }, { cve: "CVE-2022-29404", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-30522", }, { cve: "CVE-2022-30556", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-30556", }, { cve: "CVE-2022-31813", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-31813", }, { cve: "CVE-2022-3517", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-3517", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-41741", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-41741", }, { cve: "CVE-2022-41742", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-41742", }, { cve: "CVE-2022-4203", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-4203", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-46663", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-46663", }, { cve: "CVE-2022-4886", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2022-4886", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0216", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0216", }, { cve: "CVE-2023-0217", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0217", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0401", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0401", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0767", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-0767", }, { cve: "CVE-2023-1255", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-1255", }, { cve: "CVE-2023-2002", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-2002", }, { cve: "CVE-2023-20593", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-20593", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21840", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-21840", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21912", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-21912", }, { cve: "CVE-2023-21963", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-21963", }, { cve: "CVE-2023-21980", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-21980", }, { cve: "CVE-2023-22025", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-22025", }, { cve: "CVE-2023-22067", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-22067", }, { cve: "CVE-2023-22081", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-22081", }, { cve: "CVE-2023-22652", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-22652", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-25153", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-25153", }, { cve: "CVE-2023-25173", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-25173", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-2700", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-2700", }, { cve: "CVE-2023-27522", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-27522", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-2975", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-2975", }, { cve: "CVE-2023-30079", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-30079", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-3090", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-3090", }, { cve: "CVE-2023-32067", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-32067", }, { cve: "CVE-2023-32360", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-32360", }, { cve: "CVE-2023-32435", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-32435", }, { cve: "CVE-2023-32439", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-32439", }, { cve: "CVE-2023-32732", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-32732", }, { cve: "CVE-2023-3341", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-3341", }, { cve: "CVE-2023-3390", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-3390", }, { cve: "CVE-2023-33953", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-33953", }, { cve: "CVE-2023-34058", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-34058", }, { cve: "CVE-2023-34059", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-34059", }, { cve: "CVE-2023-3446", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-3446", }, { cve: "CVE-2023-34969", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-34969", }, { cve: "CVE-2023-35001", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-35001", }, { cve: "CVE-2023-35788", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-35788", }, { cve: "CVE-2023-3611", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-3611", }, { cve: "CVE-2023-37450", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-37450", }, { cve: "CVE-2023-3776", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-3776", }, { cve: "CVE-2023-3817", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-3817", }, { cve: "CVE-2023-4004", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-4004", }, { cve: "CVE-2023-4206", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-4206", }, { cve: "CVE-2023-4207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-4207", }, { cve: "CVE-2023-4208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-4208", }, { cve: "CVE-2023-42753", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-42753", }, { cve: "CVE-2023-4785", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-4785", }, { cve: "CVE-2023-4807", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-4807", }, { cve: "CVE-2023-4863", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-4863", }, { cve: "CVE-2023-5043", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-5043", }, { cve: "CVE-2023-5129", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-5129", }, { cve: "CVE-2023-5363", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2023-5363", }, { cve: "CVE-2024-20918", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-20918", }, { cve: "CVE-2024-20919", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-20919", }, { cve: "CVE-2024-20921", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-20921", }, { cve: "CVE-2024-20926", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-20926", }, { cve: "CVE-2024-20932", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-20932", }, { cve: "CVE-2024-20945", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-20945", }, { cve: "CVE-2024-20952", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-20952", }, { cve: "CVE-2024-39511", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39511", }, { cve: "CVE-2024-39512", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39512", }, { cve: "CVE-2024-39513", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39513", }, { cve: "CVE-2024-39514", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39514", }, { cve: "CVE-2024-39517", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39517", }, { cve: "CVE-2024-39518", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39518", }, { cve: "CVE-2024-39519", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39519", }, { cve: "CVE-2024-39520", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39520", }, { cve: "CVE-2024-39521", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39521", }, { cve: "CVE-2024-39522", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39522", }, { cve: "CVE-2024-39523", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39523", }, { cve: "CVE-2024-39524", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39524", }, { cve: "CVE-2024-39528", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39528", }, { cve: "CVE-2024-39529", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39529", }, { cve: "CVE-2024-39530", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39530", }, { cve: "CVE-2024-39531", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39531", }, { cve: "CVE-2024-39532", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39532", }, { cve: "CVE-2024-39533", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39533", }, { cve: "CVE-2024-39535", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39535", }, { cve: "CVE-2024-39536", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39536", }, { cve: "CVE-2024-39537", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39537", }, { cve: "CVE-2024-39538", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39538", }, { cve: "CVE-2024-39539", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39539", }, { cve: "CVE-2024-39540", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39540", }, { cve: "CVE-2024-39541", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39541", }, { cve: "CVE-2024-39542", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39542", }, { cve: "CVE-2024-39543", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39543", }, { cve: "CVE-2024-39545", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39545", }, { cve: "CVE-2024-39546", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39546", }, { cve: "CVE-2024-39548", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39548", }, { cve: "CVE-2024-39549", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39549", }, { cve: "CVE-2024-39550", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39550", }, { cve: "CVE-2024-39551", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39551", }, { cve: "CVE-2024-39553", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39553", }, { cve: "CVE-2024-39554", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39554", }, { cve: "CVE-2024-39555", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39555", }, { cve: "CVE-2024-39556", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39556", }, { cve: "CVE-2024-39557", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39557", }, { cve: "CVE-2024-39558", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39558", }, { cve: "CVE-2024-39559", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39559", }, { cve: "CVE-2024-39560", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39560", }, { cve: "CVE-2024-39561", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39561", }, { cve: "CVE-2024-39565", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.", }, ], product_status: { known_affected: [ "T036093", ], }, release_date: "2024-07-10T22:00:00.000+00:00", title: "CVE-2024-39565", }, ], }
wid-sec-w-2022-0192
Vulnerability from csaf_certbund
Published
2022-06-07 22:00
Modified
2024-03-26 23:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um falsche Informationen darzustellen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herzustellen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- F5 Networks
- Hardware Appliance
- Linux
- NetApp Appliance
- Sonstiges
- UNIX
- Windows
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apache ist ein Webserver für verschiedene Plattformen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um falsche Informationen darzustellen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herzustellen und Sicherheitsmaßnahmen zu umgehen.", title: "Angriff", }, { category: "general", text: "- F5 Networks\n- Hardware Appliance\n- Linux\n- NetApp Appliance\n- Sonstiges\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0192 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0192.json", }, { category: "self", summary: "WID-SEC-2022-0192 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0192", }, { category: "external", summary: "Ubuntu Security Notice USN-5487-1 vom 2022-06-21", url: "https://ubuntu.com/security/notices/USN-5487-1", }, { category: "external", summary: "Apache Security Advisory vom 2022-06-07", url: "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.54", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2099-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2101-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html", }, { category: "external", summary: "IBM Security Bulletin 6595149 vom 2022-06-16", url: "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-http-server-used-by-ibm-websphere-application-server-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-5487-2 vom 2022-06-23", url: "https://ubuntu.com/security/notices/USN-5487-2", }, { category: "external", summary: "Ubuntu Security Notice USN-5487-3 vom 2022-06-24", url: "https://ubuntu.com/security/notices/USN-5487-3", }, { category: "external", summary: "F5 Security Advisory K58003591 vom 2022-07-05", url: "https://support.f5.com/csp/article/K58003591", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2302-1 vom 2022-07-06", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1607 vom 2022-07-07", url: "https://alas.aws.amazon.com/ALAS-2022-1607.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2342-1 vom 2022-07-08", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2338-1 vom 2022-07-08", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html", }, { category: "external", summary: "F5 Security Advisory K40582331 vom 2022-07-08", url: "https://support.f5.com/csp/article/K40582331", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1812 vom 2022-07-15", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1812.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-110 vom 2022-07-21", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-110.html", }, { category: "external", summary: "NetApp Security Advisory NTAP-20220624-0005 vom 2022-07-27", url: "https://security.netapp.com/advisory/ntap-20220624-0005/", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9675 vom 2022-08-04", url: "http://linux.oracle.com/errata/ELSA-2022-9675.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9676 vom 2022-08-04", url: "http://linux.oracle.com/errata/ELSA-2022-9676.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9680 vom 2022-08-05", url: "http://linux.oracle.com/errata/ELSA-2022-9680.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9682 vom 2022-08-11", url: "https://linux.oracle.com/errata/ELSA-2022-9682.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-20 vom 2022-08-14", url: "https://security.gentoo.org/glsa/202208-20", }, { category: "external", summary: "QNAP Security Advisory QSA-22-23 vom 2022-08-15", url: "https://www.qnap.com/de-de/security-advisory/QSA-22-23", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-9714 vom 2022-08-17", url: "http://linux.oracle.com/errata/ELSA-2022-9714.html", }, { category: "external", summary: "HCL Article KB0100505 vom 2022-09-21", url: "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0100505", }, { category: "external", summary: "baramundi Sicherheitsupdate S-2022-01 vom 2022-09-27", url: "https://www.baramundi.com/de-de/security-info/s-2022-01/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6753 vom 2022-09-29", url: "https://access.redhat.com/errata/RHSA-2022:6753", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-202 vom 2022-11-04", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-202.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:7647 vom 2022-11-08", url: "https://access.redhat.com/errata/RHSA-2022:7647", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:8067 vom 2022-11-15", url: "https://access.redhat.com/errata/RHSA-2022:8067", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-7647 vom 2022-11-15", url: "https://linux.oracle.com/errata/ELSA-2022-7647.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-8067 vom 2022-11-22", url: "https://linux.oracle.com/errata/ELSA-2022-8067.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:8840 vom 2022-12-08", url: "https://access.redhat.com/errata/RHSA-2022:8840", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:8841 vom 2022-12-08", url: "https://access.redhat.com/errata/RHSA-2022:8841", }, { category: "external", summary: "IBM Security Bulletin 6595149 abgerufen am 2023-02-17", url: "https://www.ibm.com/support/pages/node/6595149", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-1593 vom 2023-04-05", url: "https://linux.oracle.com/errata/ELSA-2023-1593.html", }, { category: "external", summary: "F5 Security Advisory K26314875 vom 2023-04-06", url: "https://my.f5.com/manage/s/article/K26314875", }, { category: "external", summary: "F5 Security Advisory K40582331 vom 2023-06-22", url: "https://my.f5.com/manage/s/article/K40582331", }, { category: "external", summary: "HPE Securi+y Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us", }, { category: "external", summary: "IBM Security Bulletin 7063718 vom 2023-10-31", url: "https://www.ibm.com/support/pages/node/7063718", }, { category: "external", summary: "IBM Security Bulletin 7145265 vom 2024-03-26", url: "https://www.ibm.com/support/pages/node/7145265", }, ], source_lang: "en-US", title: "Apache HTTP Server: Mehrere Schwachstellen", tracking: { current_release_date: "2024-03-26T23:00:00.000+00:00", generator: { date: "2024-08-15T17:27:11.815+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0192", initial_release_date: "2022-06-07T22:00:00.000+00:00", revision_history: [ { date: "2022-06-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-06-16T22:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE und IBM aufgenommen", }, { date: "2022-06-21T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-22T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-23T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-07-05T22:00:00.000+00:00", number: "6", summary: "F5 stellt neue Informationen bereit", }, { date: "2022-07-06T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-07T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-10T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE und Informationen von F5 aufgenommen", }, { date: "2022-07-14T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-21T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-27T22:00:00.000+00:00", number: "12", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2022-08-04T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-08-07T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-08-10T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-08-14T22:00:00.000+00:00", number: "16", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-08-15T22:00:00.000+00:00", number: "17", summary: "Neue Updates von QNAP aufgenommen", }, { date: "2022-08-17T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-09-20T22:00:00.000+00:00", number: "19", summary: "Neue Updates von HCL aufgenommen", }, { date: "2022-09-27T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Baramundi aufgenommen", }, { date: "2022-09-29T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-11-06T23:00:00.000+00:00", number: "22", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-11-08T23:00:00.000+00:00", number: "23", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-11-15T23:00:00.000+00:00", number: "24", summary: "Neue Updates von Red Hat und Oracle Linux aufgenommen", }, { date: "2022-11-21T23:00:00.000+00:00", number: "25", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-12-08T23:00:00.000+00:00", number: "26", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-02-16T23:00:00.000+00:00", number: "27", summary: "Aktualisierung IBM Link wg. nicht mehr erreichbarer URL, Ergänzung Produktliste dazu", }, { date: "2023-04-04T22:00:00.000+00:00", number: "28", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2023-04-10T22:00:00.000+00:00", number: "29", summary: "Neue Updates von F5 aufgenommen", }, { date: "2023-06-22T22:00:00.000+00:00", number: "30", summary: "Neue Updates von F5 aufgenommen", }, { date: "2023-08-13T22:00:00.000+00:00", number: "31", summary: "Neue Updates von HP aufgenommen", }, { date: "2023-10-31T23:00:00.000+00:00", number: "32", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-03-26T23:00:00.000+00:00", number: "33", summary: "Neue Updates von IBM aufgenommen", }, ], status: "final", version: "33", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { branches: [ { category: "product_version_range", name: "< 2.4.54", product: { name: "Apache HTTP Server < 2.4.54", product_id: "T023434", }, }, ], category: "product_name", name: "HTTP Server", }, ], category: "vendor", name: "Apache", }, { branches: [ { category: "product_name", name: "Baramundi Management Suite", product: { name: "Baramundi Management Suite", product_id: "T024720", product_identification_helper: { cpe: "cpe:/a:baramundi:management_suite:-", }, }, }, ], category: "vendor", name: "Baramundi", }, { branches: [ { category: "product_name", name: "Broadcom Brocade Switch", product: { name: "Broadcom Brocade Switch", product_id: "T015844", product_identification_helper: { cpe: "cpe:/h:brocade:switch:-", }, }, }, ], category: "vendor", name: "Broadcom", }, { branches: [ { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, { category: "product_version_range", name: "< 15.1.9", product: { name: "F5 BIG-IP < 15.1.9", product_id: "T028287", }, }, ], category: "product_name", name: "BIG-IP", }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "HCL Commerce", product: { name: "HCL Commerce", product_id: "T019293", product_identification_helper: { cpe: "cpe:/a:hcltechsw:commerce:-", }, }, }, ], category: "vendor", name: "HCL", }, { branches: [ { category: "product_name", name: "HPE Switch", product: { name: "HPE Switch", product_id: "T005119", product_identification_helper: { cpe: "cpe:/h:hp:switch:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { branches: [ { category: "product_version", name: "8.5", product: { name: "IBM HTTP Server 8.5", product_id: "T001650", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:8.5", }, }, }, { category: "product_version", name: "7", product: { name: "IBM HTTP Server 7.0", product_id: "T003674", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:7.0", }, }, }, { category: "product_version", name: "8", product: { name: "IBM HTTP Server 8.0", product_id: "T003675", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:8.0", }, }, }, { category: "product_name", name: "IBM HTTP Server", product: { name: "IBM HTTP Server", product_id: "T004019", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:-", }, }, }, { category: "product_version", name: "9", product: { name: "IBM HTTP Server 9.0", product_id: "T008162", product_identification_helper: { cpe: "cpe:/a:ibm:http_server:9.0", }, }, }, ], category: "product_name", name: "HTTP Server", }, { branches: [ { category: "product_version_range", name: "< 7.5.0 UP8", product: { name: "IBM QRadar SIEM < 7.5.0 UP8", product_id: "T033681", }, }, ], category: "product_name", name: "QRadar SIEM", }, { branches: [ { category: "product_version_range", name: "< 8.0.0.24", product: { name: "IBM Rational Build Forge < 8.0.0.24", product_id: "T030689", }, }, ], category: "product_name", name: "Rational Build Forge", }, { category: "product_name", name: "IBM WebSphere Application Server", product: { name: "IBM WebSphere Application Server", product_id: "5198", product_identification_helper: { cpe: "cpe:/a:ibm:websphere_application_server:-", }, }, }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "NetApp Data ONTAP", product: { name: "NetApp Data ONTAP", product_id: "7654", product_identification_helper: { cpe: "cpe:/a:netapp:data_ontap:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "QNAP NAS", product: { name: "QNAP NAS", product_id: "T017100", product_identification_helper: { cpe: "cpe:/h:qnap:nas:-", }, }, }, ], category: "vendor", name: "QNAP", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-26377", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund einer unsachgemäßen Validierung von HTTP-Anfragen in mod_proxy_ajp. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um HTTP-Request-Schmuggel-Angriffe durchzuführen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-26377", }, { cve: "CVE-2022-28330", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-28330", }, { cve: "CVE-2022-28614", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-28615", }, { cve: "CVE-2022-30556", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-30556", }, { cve: "CVE-2022-29404", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Eingabevalidierungsfehlers und einer Ressourcenerschöpfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", notes: [ { category: "description", text: "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Eingabevalidierungsfehlers und einer Ressourcenerschöpfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-30522", }, { cve: "CVE-2022-31813", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund eines Fehlers in der mod_proxy-Implementierung, bei dem der Webserver möglicherweise die X-Forwarded-*-Header nicht an den Ursprungsserver sendet, basierend auf dem clientseitigen Connection-Header-Hop-by-Hop-Mechanismus. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsmaßnahmen zu umgehen.", }, ], product_status: { known_affected: [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162", ], }, release_date: "2022-06-07T22:00:00.000+00:00", title: "CVE-2022-31813", }, ], }
opensuse-su-2024:12142-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
apache2-2.4.54-1.1 on GA media
Notes
Title of the patch
apache2-2.4.54-1.1 on GA media
Description of the patch
These are all security issues fixed in the apache2-2.4.54-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12142
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "apache2-2.4.54-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the apache2-2.4.54-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12142", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12142-1.json", }, { category: "self", summary: "SUSE CVE CVE-2022-26377 page", url: "https://www.suse.com/security/cve/CVE-2022-26377/", }, { category: "self", summary: "SUSE CVE CVE-2022-28330 page", url: "https://www.suse.com/security/cve/CVE-2022-28330/", }, { category: "self", summary: "SUSE CVE CVE-2022-28614 page", url: "https://www.suse.com/security/cve/CVE-2022-28614/", }, { category: "self", summary: "SUSE CVE CVE-2022-28615 page", url: "https://www.suse.com/security/cve/CVE-2022-28615/", }, { category: "self", summary: "SUSE CVE CVE-2022-29404 page", url: "https://www.suse.com/security/cve/CVE-2022-29404/", }, { category: "self", summary: "SUSE CVE CVE-2022-30522 page", url: "https://www.suse.com/security/cve/CVE-2022-30522/", }, { category: "self", summary: "SUSE CVE CVE-2022-30556 page", url: "https://www.suse.com/security/cve/CVE-2022-30556/", }, { category: "self", summary: "SUSE CVE CVE-2022-31813 page", url: "https://www.suse.com/security/cve/CVE-2022-31813/", }, ], title: "apache2-2.4.54-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12142-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.54-1.1.aarch64", product: { name: "apache2-2.4.54-1.1.aarch64", product_id: "apache2-2.4.54-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.54-1.1.ppc64le", product: { name: "apache2-2.4.54-1.1.ppc64le", product_id: "apache2-2.4.54-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.54-1.1.s390x", product: { name: "apache2-2.4.54-1.1.s390x", product_id: "apache2-2.4.54-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.54-1.1.x86_64", product: { name: "apache2-2.4.54-1.1.x86_64", product_id: "apache2-2.4.54-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.54-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", }, product_reference: "apache2-2.4.54-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.54-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", }, product_reference: "apache2-2.4.54-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.54-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", }, product_reference: "apache2-2.4.54-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.54-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", }, product_reference: "apache2-2.4.54-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2022-26377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26377", }, ], notes: [ { category: "general", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26377", url: "https://www.suse.com/security/cve/CVE-2022-26377", }, { category: "external", summary: "SUSE Bug 1200338 for CVE-2022-26377", url: "https://bugzilla.suse.com/1200338", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-26377", }, { cve: "CVE-2022-28330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28330", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28330", url: "https://www.suse.com/security/cve/CVE-2022-28330", }, { category: "external", summary: "SUSE Bug 1200339 for CVE-2022-28330", url: "https://bugzilla.suse.com/1200339", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-28330", }, { cve: "CVE-2022-28614", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28614", }, ], notes: [ { category: "general", text: "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28614", url: "https://www.suse.com/security/cve/CVE-2022-28614", }, { category: "external", summary: "SUSE Bug 1200340 for CVE-2022-28614", url: "https://bugzilla.suse.com/1200340", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28614", }, { cve: "CVE-2022-28615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28615", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28615", url: "https://www.suse.com/security/cve/CVE-2022-28615", }, { category: "external", summary: "SUSE Bug 1200341 for CVE-2022-28615", url: "https://bugzilla.suse.com/1200341", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-28615", }, { cve: "CVE-2022-29404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29404", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29404", url: "https://www.suse.com/security/cve/CVE-2022-29404", }, { category: "external", summary: "SUSE Bug 1200345 for CVE-2022-29404", url: "https://bugzilla.suse.com/1200345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-29404", }, { cve: "CVE-2022-30522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30522", }, ], notes: [ { category: "general", text: "If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30522", url: "https://www.suse.com/security/cve/CVE-2022-30522", }, { category: "external", summary: "SUSE Bug 1200352 for CVE-2022-30522", url: "https://bugzilla.suse.com/1200352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-30522", }, { cve: "CVE-2022-30556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-30556", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-30556", url: "https://www.suse.com/security/cve/CVE-2022-30556", }, { category: "external", summary: "SUSE Bug 1200350 for CVE-2022-30556", url: "https://bugzilla.suse.com/1200350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-30556", }, { cve: "CVE-2022-31813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-31813", }, ], notes: [ { category: "general", text: "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-31813", url: "https://www.suse.com/security/cve/CVE-2022-31813", }, { category: "external", summary: "SUSE Bug 1200348 for CVE-2022-31813", url: "https://bugzilla.suse.com/1200348", }, { category: "external", summary: "SUSE Bug 1219585 for CVE-2022-31813", url: "https://bugzilla.suse.com/1219585", }, { category: "external", summary: "SUSE Bug 1225670 for CVE-2022-31813", url: "https://bugzilla.suse.com/1225670", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.54-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.54-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.54-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.54-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-31813", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.