var-201809-0686
Vulnerability from variot

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.). curl Contains an integer overflow vulnerability. This vulnerability CVE-2017-8816 It is a similar problem.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. cURL/libcURL is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. cURL/libcURL version 7.15.4 through 7.61.0 are vulnerable. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201903-03


                                       https://security.gentoo.org/

Severity: Normal Title: cURL: Multiple vulnerabilities Date: March 10, 2019 Bugs: #665292, #670026, #677346 ID: 201903-03


Synopsis

Multiple vulnerabilities have been found in cURL, the worst of which could result in a Denial of Service condition.

Background

A command line tool and library for transferring data with URLs.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-misc/curl < 7.64.0 >= 7.64.0

Description

Multiple vulnerabilities have been discovered in cURL. Please review the CVE identifiers referenced below for details.

Impact

Remote attackers could cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All cURL users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/curl-7.64.0"

References

[ 1 ] CVE-2018-14618 https://nvd.nist.gov/vuln/detail/CVE-2018-14618 [ 2 ] CVE-2018-16839 https://nvd.nist.gov/vuln/detail/CVE-2018-16839 [ 3 ] CVE-2018-16840 https://nvd.nist.gov/vuln/detail/CVE-2018-16840 [ 4 ] CVE-2018-16842 https://nvd.nist.gov/vuln/detail/CVE-2018-16842 [ 5 ] CVE-2019-3822 https://nvd.nist.gov/vuln/detail/CVE-2019-3822 [ 6 ] CVE-2019-3823 https://nvd.nist.gov/vuln/detail/CVE-2019-3823

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201903-03

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2019 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-3765-2 September 17, 2018

curl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 ESM

Summary:

curl could be made to run arbitrary code if it received a specially crafted input. This update provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that curl incorrectly handled certain inputs.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM: curl 7.22.0-3ubuntu4.23 libcurl3 7.22.0-3ubuntu4.23 libcurl3-gnutls 7.22.0-3ubuntu4.23 libcurl3-nss 7.22.0-3ubuntu4.23

In general, a standard system update will make all the necessary changes. 7) - aarch64, ppc64le, s390x

  1. Description:

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

  • curl: NTLM password overflow via integer overflow (CVE-2018-14618)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • baseurl with file:// hangs and then timeout in yum repo (BZ#1709474)

  • curl crashes on http links with rate-limit (BZ#1711914)

Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/curl-7.61.1-i586-1_slack14.2.txz: Upgraded. For more information, see: https://curl.haxx.se/docs/CVE-2018-14618.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618 ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/curl-7.61.1-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/curl-7.61.1-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/curl-7.61.1-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/curl-7.61.1-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/curl-7.61.1-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/curl-7.61.1-x86_64-1_slack14.2.txz

Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/curl-7.61.1-i586-1.txz

Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/curl-7.61.1-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 14.0 package: d6493074efefb47021747a0f525a3875 curl-7.61.1-i486-1_slack14.0.txz

Slackware x86_64 14.0 package: 9d5fb07395d570c7af54d306dff25e0d curl-7.61.1-x86_64-1_slack14.0.txz

Slackware 14.1 package: fff7b1f0df80b7b8386e6b1b58fadaec curl-7.61.1-i486-1_slack14.1.txz

Slackware x86_64 14.1 package: fe69bb3baaf679dec8bd3abea3c6ef02 curl-7.61.1-x86_64-1_slack14.1.txz

Slackware 14.2 package: e130826573cd1cf9b5d769690ff91811 curl-7.61.1-i586-1_slack14.2.txz

Slackware x86_64 14.2 package: 161e1f2949b0285484de8aa16953c5e7 curl-7.61.1-x86_64-1_slack14.2.txz

Slackware -current package: 7135b216f6e989b0ae3e6123f6a07083 n/curl-7.61.1-i586-1.txz

Slackware x86_64 -current package: b96ce6cdc7ae46e5979563f8f939fcfd n/curl-7.61.1-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the package as root:

upgradepkg curl-7.61.1-i586-1_slack14.2.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: httpd24 security, bug fix, and enhancement update Advisory ID: RHSA-2018:3558-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2018:3558 Issue date: 2018-11-13 CVE Names: CVE-2016-5419 CVE-2016-5420 CVE-2016-5421 CVE-2016-7141 CVE-2016-7167 CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8620 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624 CVE-2016-8625 CVE-2016-9586 CVE-2017-7407 CVE-2017-8816 CVE-2017-8817 CVE-2017-15710 CVE-2017-15715 CVE-2017-1000100 CVE-2017-1000101 CVE-2017-1000254 CVE-2017-1000257 CVE-2018-1283 CVE-2018-1301 CVE-2018-1303 CVE-2018-1312 CVE-2018-1333 CVE-2018-11763 CVE-2018-14618 CVE-2018-1000007 CVE-2018-1000120 CVE-2018-1000121 CVE-2018-1000122 CVE-2018-1000301 =====================================================================

  1. Summary:

An update for httpd24-httpd, httpd24-nghttp2, and httpd24-curl is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64

  1. Description:

The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module.

The following packages have been upgraded to a later upstream version: httpd24-httpd (2.4.34), httpd24-curl (7.61.1). (BZ#1590833, BZ#1648928)

Security Fix(es):

  • httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283)

  • httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS (CVE-2018-1303)

  • httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS (CVE-2018-1333)

  • httpd: DoS for HTTP/2 connections by continuous SETTINGS frames (CVE-2018-11763)

  • httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values (CVE-2017-15710)

  • httpd: bypass with a trailing newline in the file name (CVE-2017-15715)

  • httpd: Out of bounds access after failure in reading the HTTP request (CVE-2018-1301)

  • httpd: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312)

  • curl: Multiple security issues were fixed in httpd24-curl (CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9586, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000254, CVE-2017-1000257, CVE-2017-7407, CVE-2017-8816, CVE-2017-8817, CVE-2018-1000007, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000301, CVE-2018-14618)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Red Hat would like to thank the Curl project for reporting CVE-2017-8816, CVE-2017-8817, CVE-2017-1000254, CVE-2017-1000257, CVE-2018-1000007, CVE-2018-1000120, CVE-2018-1000122, CVE-2018-1000301, CVE-2016-9586, CVE-2017-1000100, CVE-2017-1000101, CVE-2018-14618, and CVE-2018-1000121. Upstream acknowledges Alex Nichols as the original reporter of CVE-2017-8816; the OSS-Fuzz project as the original reporter of CVE-2017-8817 and CVE-2018-1000301; Max Dymond as the original reporter of CVE-2017-1000254 and CVE-2018-1000122; Brian Carpenter and the OSS-Fuzz project as the original reporters of CVE-2017-1000257; Craig de Stigter as the original reporter of CVE-2018-1000007; Duy Phan Thanh as the original reporter of CVE-2018-1000120; Even Rouault as the original reporter of CVE-2017-1000100; Brian Carpenter as the original reporter of CVE-2017-1000101; Zhaoyang Wu as the original reporter of CVE-2018-14618; and Dario Weisser as the original reporter of CVE-2018-1000121.

Bug Fix(es):

  • Previously, the Apache HTTP Server from the httpd24 Software Collection was unable to handle situations when static content was repeatedly requested in a browser by refreshing the page. As a consequence, HTTP/2 connections timed out and httpd became unresponsive. This bug has been fixed, and HTTP/2 connections now work as expected in the described scenario. (BZ#1518737)

Enhancement(s):

  • This update adds the mod_md module to the httpd24 Software Collection. This module enables managing domains across virtual hosts and certificate provisioning using the Automatic Certificate Management Environment (ACME) protocol. The mod_md module is available only for Red Hat Enterprise Linux
  • (BZ#1640722)

Additional Changes:

For detailed information on changes in this release, see the Red Hat Software Collections 3.2 Release Notes linked from the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon will be restarted automatically.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1362183 - CVE-2016-5419 curl: TLS session resumption client cert bypass 1362190 - CVE-2016-5420 curl: Re-using connection with wrong client cert 1362199 - CVE-2016-5421 curl: Use of connection struct after free 1373229 - CVE-2016-7141 curl: Incorrect reuse of client certificates 1375906 - CVE-2016-7167 curl: escape and unescape integer overflows 1388370 - CVE-2016-8615 curl: Cookie injection for other servers 1388371 - CVE-2016-8616 curl: Case insensitive password comparison 1388377 - CVE-2016-8617 curl: Out-of-bounds write via unchecked multiplication 1388378 - CVE-2016-8618 curl: Double-free in curl_maprintf 1388379 - CVE-2016-8619 curl: Double-free in krb5 code 1388382 - CVE-2016-8620 curl: Glob parser write/read out of bounds 1388385 - CVE-2016-8621 curl: curl_getdate out-of-bounds read 1388386 - CVE-2016-8622 curl: URL unescape heap overflow via integer truncation 1388388 - CVE-2016-8623 curl: Use-after-free via shared cookies 1388390 - CVE-2016-8624 curl: Invalid URL parsing with '#' 1388392 - CVE-2016-8625 curl: IDNA 2003 makes curl use wrong host 1406712 - CVE-2016-9586 curl: printf floating point buffer overflow 1439190 - CVE-2017-7407 curl: --write-out out of bounds read 1478309 - CVE-2017-1000101 curl: URL globbing out of bounds read 1478310 - CVE-2017-1000100 curl: TFTP sends more than buffer size 1495541 - CVE-2017-1000254 curl: FTP PWD response parser out of bounds read 1503705 - CVE-2017-1000257 curl: IMAP FETCH response out of bounds read 1515757 - CVE-2017-8816 curl: NTLM buffer overflow via integer overflow 1515760 - CVE-2017-8817 curl: FTP wildcard out of bounds read 1518737 - HTTP/2 connections hang and timeout 1537125 - CVE-2018-1000007 curl: HTTP authentication leak in redirects 1540167 - provides without httpd24 pre/in-fix 1552628 - CVE-2018-1000120 curl: FTP path trickery leads to NIL byte out of bounds write 1552631 - CVE-2018-1000121 curl: LDAP NULL pointer dereference 1553398 - CVE-2018-1000122 curl: RTSP RTP buffer over-read 1558450 - Not able to use SSLOpenSSLConfCmd with httpd24-httpd-2.4.27. 1560395 - CVE-2018-1283 httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications 1560399 - CVE-2018-1303 httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS 1560599 - CVE-2017-15710 httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values 1560614 - CVE-2017-15715 httpd: bypass with a trailing newline in the file name 1560634 - CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest 1560643 - CVE-2018-1301 httpd: Out of bounds access after failure in reading the HTTP request 1575536 - CVE-2018-1000301 curl: Out-of-bounds heap read when missing RTSP headers allows information leak of denial of service 1605048 - CVE-2018-1333 httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS 1622707 - CVE-2018-14618 curl: NTLM password overflow via integer overflow 1628389 - Make OCSP more configurable (like CRL) 1633260 - mod_session missing apr-util-openssl 1633399 - CVE-2018-11763 httpd: DoS for HTTP/2 connections by continuous SETTINGS frames 1634830 - FTBFS: httpd24-httpd 1640722 - mod_md is missing in httpd24-httpd 1646937 - Unable to start httpd 1648928 - Rebase curl to the latest version

  1. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):

Source: httpd24-curl-7.61.1-1.el6.src.rpm httpd24-httpd-2.4.34-7.el6.src.rpm httpd24-nghttp2-1.7.1-7.el6.src.rpm

noarch: httpd24-httpd-manual-2.4.34-7.el6.noarch.rpm

x86_64: httpd24-curl-7.61.1-1.el6.x86_64.rpm httpd24-curl-debuginfo-7.61.1-1.el6.x86_64.rpm httpd24-httpd-2.4.34-7.el6.x86_64.rpm httpd24-httpd-debuginfo-2.4.34-7.el6.x86_64.rpm httpd24-httpd-devel-2.4.34-7.el6.x86_64.rpm httpd24-httpd-tools-2.4.34-7.el6.x86_64.rpm httpd24-libcurl-7.61.1-1.el6.x86_64.rpm httpd24-libcurl-devel-7.61.1-1.el6.x86_64.rpm httpd24-libnghttp2-1.7.1-7.el6.x86_64.rpm httpd24-libnghttp2-devel-1.7.1-7.el6.x86_64.rpm httpd24-mod_ldap-2.4.34-7.el6.x86_64.rpm httpd24-mod_proxy_html-2.4.34-7.el6.x86_64.rpm httpd24-mod_session-2.4.34-7.el6.x86_64.rpm httpd24-mod_ssl-2.4.34-7.el6.x86_64.rpm httpd24-nghttp2-1.7.1-7.el6.x86_64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):

Source: httpd24-curl-7.61.1-1.el6.src.rpm httpd24-httpd-2.4.34-7.el6.src.rpm httpd24-nghttp2-1.7.1-7.el6.src.rpm

noarch: httpd24-httpd-manual-2.4.34-7.el6.noarch.rpm

x86_64: httpd24-curl-7.61.1-1.el6.x86_64.rpm httpd24-curl-debuginfo-7.61.1-1.el6.x86_64.rpm httpd24-httpd-2.4.34-7.el6.x86_64.rpm httpd24-httpd-debuginfo-2.4.34-7.el6.x86_64.rpm httpd24-httpd-devel-2.4.34-7.el6.x86_64.rpm httpd24-httpd-tools-2.4.34-7.el6.x86_64.rpm httpd24-libcurl-7.61.1-1.el6.x86_64.rpm httpd24-libcurl-devel-7.61.1-1.el6.x86_64.rpm httpd24-libnghttp2-1.7.1-7.el6.x86_64.rpm httpd24-libnghttp2-devel-1.7.1-7.el6.x86_64.rpm httpd24-mod_ldap-2.4.34-7.el6.x86_64.rpm httpd24-mod_proxy_html-2.4.34-7.el6.x86_64.rpm httpd24-mod_session-2.4.34-7.el6.x86_64.rpm httpd24-mod_ssl-2.4.34-7.el6.x86_64.rpm httpd24-nghttp2-1.7.1-7.el6.x86_64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source: httpd24-curl-7.61.1-1.el7.src.rpm httpd24-httpd-2.4.34-7.el7.src.rpm httpd24-nghttp2-1.7.1-7.el7.src.rpm

aarch64: httpd24-curl-7.61.1-1.el7.aarch64.rpm httpd24-curl-debuginfo-7.61.1-1.el7.aarch64.rpm httpd24-httpd-2.4.34-7.el7.aarch64.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.aarch64.rpm httpd24-httpd-devel-2.4.34-7.el7.aarch64.rpm httpd24-httpd-tools-2.4.34-7.el7.aarch64.rpm httpd24-libcurl-7.61.1-1.el7.aarch64.rpm httpd24-libcurl-devel-7.61.1-1.el7.aarch64.rpm httpd24-libnghttp2-1.7.1-7.el7.aarch64.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.aarch64.rpm httpd24-mod_ldap-2.4.34-7.el7.aarch64.rpm httpd24-mod_md-2.4.34-7.el7.aarch64.rpm httpd24-mod_proxy_html-2.4.34-7.el7.aarch64.rpm httpd24-mod_session-2.4.34-7.el7.aarch64.rpm httpd24-mod_ssl-2.4.34-7.el7.aarch64.rpm httpd24-nghttp2-1.7.1-7.el7.aarch64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.aarch64.rpm

noarch: httpd24-httpd-manual-2.4.34-7.el7.noarch.rpm

ppc64le: httpd24-curl-7.61.1-1.el7.ppc64le.rpm httpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm httpd24-httpd-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm httpd24-libcurl-7.61.1-1.el7.ppc64le.rpm httpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm httpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm httpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm httpd24-mod_md-2.4.34-7.el7.ppc64le.rpm httpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm httpd24-mod_session-2.4.34-7.el7.ppc64le.rpm httpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm httpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm

s390x: httpd24-curl-7.61.1-1.el7.s390x.rpm httpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm httpd24-httpd-2.4.34-7.el7.s390x.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm httpd24-httpd-devel-2.4.34-7.el7.s390x.rpm httpd24-httpd-tools-2.4.34-7.el7.s390x.rpm httpd24-libcurl-7.61.1-1.el7.s390x.rpm httpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm httpd24-libnghttp2-1.7.1-7.el7.s390x.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm httpd24-mod_ldap-2.4.34-7.el7.s390x.rpm httpd24-mod_md-2.4.34-7.el7.s390x.rpm httpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm httpd24-mod_session-2.4.34-7.el7.s390x.rpm httpd24-mod_ssl-2.4.34-7.el7.s390x.rpm httpd24-nghttp2-1.7.1-7.el7.s390x.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source: httpd24-curl-7.61.1-1.el7.src.rpm httpd24-httpd-2.4.34-7.el7.src.rpm httpd24-nghttp2-1.7.1-7.el7.src.rpm

aarch64: httpd24-curl-7.61.1-1.el7.aarch64.rpm httpd24-curl-debuginfo-7.61.1-1.el7.aarch64.rpm httpd24-httpd-2.4.34-7.el7.aarch64.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.aarch64.rpm httpd24-httpd-devel-2.4.34-7.el7.aarch64.rpm httpd24-httpd-tools-2.4.34-7.el7.aarch64.rpm httpd24-libcurl-7.61.1-1.el7.aarch64.rpm httpd24-libcurl-devel-7.61.1-1.el7.aarch64.rpm httpd24-libnghttp2-1.7.1-7.el7.aarch64.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.aarch64.rpm httpd24-mod_ldap-2.4.34-7.el7.aarch64.rpm httpd24-mod_md-2.4.34-7.el7.aarch64.rpm httpd24-mod_proxy_html-2.4.34-7.el7.aarch64.rpm httpd24-mod_session-2.4.34-7.el7.aarch64.rpm httpd24-mod_ssl-2.4.34-7.el7.aarch64.rpm httpd24-nghttp2-1.7.1-7.el7.aarch64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.aarch64.rpm

noarch: httpd24-httpd-manual-2.4.34-7.el7.noarch.rpm

ppc64le: httpd24-curl-7.61.1-1.el7.ppc64le.rpm httpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm httpd24-httpd-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm httpd24-libcurl-7.61.1-1.el7.ppc64le.rpm httpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm httpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm httpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm httpd24-mod_md-2.4.34-7.el7.ppc64le.rpm httpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm httpd24-mod_session-2.4.34-7.el7.ppc64le.rpm httpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm httpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm

s390x: httpd24-curl-7.61.1-1.el7.s390x.rpm httpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm httpd24-httpd-2.4.34-7.el7.s390x.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm httpd24-httpd-devel-2.4.34-7.el7.s390x.rpm httpd24-httpd-tools-2.4.34-7.el7.s390x.rpm httpd24-libcurl-7.61.1-1.el7.s390x.rpm httpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm httpd24-libnghttp2-1.7.1-7.el7.s390x.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm httpd24-mod_ldap-2.4.34-7.el7.s390x.rpm httpd24-mod_md-2.4.34-7.el7.s390x.rpm httpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm httpd24-mod_session-2.4.34-7.el7.s390x.rpm httpd24-mod_ssl-2.4.34-7.el7.s390x.rpm httpd24-nghttp2-1.7.1-7.el7.s390x.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm

x86_64: httpd24-curl-7.61.1-1.el7.x86_64.rpm httpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm httpd24-httpd-2.4.34-7.el7.x86_64.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm httpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm httpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm httpd24-libcurl-7.61.1-1.el7.x86_64.rpm httpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm httpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm httpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm httpd24-mod_md-2.4.34-7.el7.x86_64.rpm httpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm httpd24-mod_session-2.4.34-7.el7.x86_64.rpm httpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm httpd24-nghttp2-1.7.1-7.el7.x86_64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):

Source: httpd24-curl-7.61.1-1.el7.src.rpm httpd24-httpd-2.4.34-7.el7.src.rpm httpd24-nghttp2-1.7.1-7.el7.src.rpm

noarch: httpd24-httpd-manual-2.4.34-7.el7.noarch.rpm

ppc64le: httpd24-curl-7.61.1-1.el7.ppc64le.rpm httpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm httpd24-httpd-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm httpd24-libcurl-7.61.1-1.el7.ppc64le.rpm httpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm httpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm httpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm httpd24-mod_md-2.4.34-7.el7.ppc64le.rpm httpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm httpd24-mod_session-2.4.34-7.el7.ppc64le.rpm httpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm httpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm

s390x: httpd24-curl-7.61.1-1.el7.s390x.rpm httpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm httpd24-httpd-2.4.34-7.el7.s390x.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm httpd24-httpd-devel-2.4.34-7.el7.s390x.rpm httpd24-httpd-tools-2.4.34-7.el7.s390x.rpm httpd24-libcurl-7.61.1-1.el7.s390x.rpm httpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm httpd24-libnghttp2-1.7.1-7.el7.s390x.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm httpd24-mod_ldap-2.4.34-7.el7.s390x.rpm httpd24-mod_md-2.4.34-7.el7.s390x.rpm httpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm httpd24-mod_session-2.4.34-7.el7.s390x.rpm httpd24-mod_ssl-2.4.34-7.el7.s390x.rpm httpd24-nghttp2-1.7.1-7.el7.s390x.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm

x86_64: httpd24-curl-7.61.1-1.el7.x86_64.rpm httpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm httpd24-httpd-2.4.34-7.el7.x86_64.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm httpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm httpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm httpd24-libcurl-7.61.1-1.el7.x86_64.rpm httpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm httpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm httpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm httpd24-mod_md-2.4.34-7.el7.x86_64.rpm httpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm httpd24-mod_session-2.4.34-7.el7.x86_64.rpm httpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm httpd24-nghttp2-1.7.1-7.el7.x86_64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):

Source: httpd24-curl-7.61.1-1.el7.src.rpm httpd24-httpd-2.4.34-7.el7.src.rpm httpd24-nghttp2-1.7.1-7.el7.src.rpm

noarch: httpd24-httpd-manual-2.4.34-7.el7.noarch.rpm

ppc64le: httpd24-curl-7.61.1-1.el7.ppc64le.rpm httpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm httpd24-httpd-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm httpd24-libcurl-7.61.1-1.el7.ppc64le.rpm httpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm httpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm httpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm httpd24-mod_md-2.4.34-7.el7.ppc64le.rpm httpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm httpd24-mod_session-2.4.34-7.el7.ppc64le.rpm httpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm httpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm

s390x: httpd24-curl-7.61.1-1.el7.s390x.rpm httpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm httpd24-httpd-2.4.34-7.el7.s390x.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm httpd24-httpd-devel-2.4.34-7.el7.s390x.rpm httpd24-httpd-tools-2.4.34-7.el7.s390x.rpm httpd24-libcurl-7.61.1-1.el7.s390x.rpm httpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm httpd24-libnghttp2-1.7.1-7.el7.s390x.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm httpd24-mod_ldap-2.4.34-7.el7.s390x.rpm httpd24-mod_md-2.4.34-7.el7.s390x.rpm httpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm httpd24-mod_session-2.4.34-7.el7.s390x.rpm httpd24-mod_ssl-2.4.34-7.el7.s390x.rpm httpd24-nghttp2-1.7.1-7.el7.s390x.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm

x86_64: httpd24-curl-7.61.1-1.el7.x86_64.rpm httpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm httpd24-httpd-2.4.34-7.el7.x86_64.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm httpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm httpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm httpd24-libcurl-7.61.1-1.el7.x86_64.rpm httpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm httpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm httpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm httpd24-mod_md-2.4.34-7.el7.x86_64.rpm httpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm httpd24-mod_session-2.4.34-7.el7.x86_64.rpm httpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm httpd24-nghttp2-1.7.1-7.el7.x86_64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):

Source: httpd24-curl-7.61.1-1.el7.src.rpm httpd24-httpd-2.4.34-7.el7.src.rpm httpd24-nghttp2-1.7.1-7.el7.src.rpm

noarch: httpd24-httpd-manual-2.4.34-7.el7.noarch.rpm

ppc64le: httpd24-curl-7.61.1-1.el7.ppc64le.rpm httpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm httpd24-httpd-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm httpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm httpd24-libcurl-7.61.1-1.el7.ppc64le.rpm httpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm httpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm httpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm httpd24-mod_md-2.4.34-7.el7.ppc64le.rpm httpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm httpd24-mod_session-2.4.34-7.el7.ppc64le.rpm httpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm httpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm

s390x: httpd24-curl-7.61.1-1.el7.s390x.rpm httpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm httpd24-httpd-2.4.34-7.el7.s390x.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm httpd24-httpd-devel-2.4.34-7.el7.s390x.rpm httpd24-httpd-tools-2.4.34-7.el7.s390x.rpm httpd24-libcurl-7.61.1-1.el7.s390x.rpm httpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm httpd24-libnghttp2-1.7.1-7.el7.s390x.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm httpd24-mod_ldap-2.4.34-7.el7.s390x.rpm httpd24-mod_md-2.4.34-7.el7.s390x.rpm httpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm httpd24-mod_session-2.4.34-7.el7.s390x.rpm httpd24-mod_ssl-2.4.34-7.el7.s390x.rpm httpd24-nghttp2-1.7.1-7.el7.s390x.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm

x86_64: httpd24-curl-7.61.1-1.el7.x86_64.rpm httpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm httpd24-httpd-2.4.34-7.el7.x86_64.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm httpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm httpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm httpd24-libcurl-7.61.1-1.el7.x86_64.rpm httpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm httpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm httpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm httpd24-mod_md-2.4.34-7.el7.x86_64.rpm httpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm httpd24-mod_session-2.4.34-7.el7.x86_64.rpm httpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm httpd24-nghttp2-1.7.1-7.el7.x86_64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source: httpd24-curl-7.61.1-1.el7.src.rpm httpd24-httpd-2.4.34-7.el7.src.rpm httpd24-nghttp2-1.7.1-7.el7.src.rpm

noarch: httpd24-httpd-manual-2.4.34-7.el7.noarch.rpm

x86_64: httpd24-curl-7.61.1-1.el7.x86_64.rpm httpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm httpd24-httpd-2.4.34-7.el7.x86_64.rpm httpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm httpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm httpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm httpd24-libcurl-7.61.1-1.el7.x86_64.rpm httpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm httpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm httpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm httpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm httpd24-mod_md-2.4.34-7.el7.x86_64.rpm httpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm httpd24-mod_session-2.4.34-7.el7.x86_64.rpm httpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm httpd24-nghttp2-1.7.1-7.el7.x86_64.rpm httpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2016-5419 https://access.redhat.com/security/cve/CVE-2016-5420 https://access.redhat.com/security/cve/CVE-2016-5421 https://access.redhat.com/security/cve/CVE-2016-7141 https://access.redhat.com/security/cve/CVE-2016-7167 https://access.redhat.com/security/cve/CVE-2016-8615 https://access.redhat.com/security/cve/CVE-2016-8616 https://access.redhat.com/security/cve/CVE-2016-8617 https://access.redhat.com/security/cve/CVE-2016-8618 https://access.redhat.com/security/cve/CVE-2016-8619 https://access.redhat.com/security/cve/CVE-2016-8620 https://access.redhat.com/security/cve/CVE-2016-8621 https://access.redhat.com/security/cve/CVE-2016-8622 https://access.redhat.com/security/cve/CVE-2016-8623 https://access.redhat.com/security/cve/CVE-2016-8624 https://access.redhat.com/security/cve/CVE-2016-8625 https://access.redhat.com/security/cve/CVE-2016-9586 https://access.redhat.com/security/cve/CVE-2017-7407 https://access.redhat.com/security/cve/CVE-2017-8816 https://access.redhat.com/security/cve/CVE-2017-8817 https://access.redhat.com/security/cve/CVE-2017-15710 https://access.redhat.com/security/cve/CVE-2017-15715 https://access.redhat.com/security/cve/CVE-2017-1000100 https://access.redhat.com/security/cve/CVE-2017-1000101 https://access.redhat.com/security/cve/CVE-2017-1000254 https://access.redhat.com/security/cve/CVE-2017-1000257 https://access.redhat.com/security/cve/CVE-2018-1283 https://access.redhat.com/security/cve/CVE-2018-1301 https://access.redhat.com/security/cve/CVE-2018-1303 https://access.redhat.com/security/cve/CVE-2018-1312 https://access.redhat.com/security/cve/CVE-2018-1333 https://access.redhat.com/security/cve/CVE-2018-11763 https://access.redhat.com/security/cve/CVE-2018-14618 https://access.redhat.com/security/cve/CVE-2018-1000007 https://access.redhat.com/security/cve/CVE-2018-1000120 https://access.redhat.com/security/cve/CVE-2018-1000121 https://access.redhat.com/security/cve/CVE-2018-1000122 https://access.redhat.com/security/cve/CVE-2018-1000301 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_software_collections/3/html/3.2_release_notes/chap-rhscl#sect-RHSCL-Changes-httpd

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBW+qMytzjgjWX9erEAQgLzQ//V6p0MJlmHHuvBRYszVGnu43cqKkSzERl vPJnEBEdzaU1+hxnBpN+PwWRp+X0j7EIgEnc3yBMSqnKnZUXhbW+2AlWKFSu96i1 WcDdaxtFkD8opjERjN+ckuOnk2Eh24eWAYoDIn0WqTR7seOdvdXsURROOyvugwXP ulGH+RQhwyxBYvYKp1RmX+REgKfW99wMxpd7B4depYhsI5ZkTzhyTbnp2E+v/XpY r8NqBJEV0C69sHrddBjvDMl+M0vwPw0X1YWEGsP20tZ3nqGPCVlCegQ+WCUU36HH 1Asxa1s2/50vlY5Aa79iJuAlotw/qy4Cxvm98A33ImBvI1WMfoRXmmkOYcOsTP3o 38fkPK4XuDiimWj+ODq29WsqvjJTZgCD32lw7MgjeyH+0u4aMYnImRtC7tG2ykRU ETXqLCnQ1I1We2ar3vI9xYLJ+wmc/Iy479eDWziiQztO2RusHxXTStt2n5XEGg1Z ylahAIyX989zJ3UcSs2h8dbMqjFzHZtie6xEtgFH8fsaPr36HjvKrTzj9rIN2xgt D1EcxjUVJRp536TzS5ULmAQSAfURruq6xTyuxI9+nDNfFXJbKI5IxIR1W6jkVIMD N1asv6UUHNzFmJgnmd94AlqDK2iCdoZBwmosk6ICcBmJVrWPMXjBDGNS3GtbKOdj RkKELMK+M5A= =7w7/ -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0686",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "libcurl",
        "scope": "lt",
        "trust": 1.8,
        "vendor": "haxx",
        "version": "7.61.1"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "18.04"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.5"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "12.04"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "ubuntu",
        "scope": null,
        "trust": 0.8,
        "vendor": "canonical",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "enterprise linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": "linux lts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "18.04"
      },
      {
        "model": "linux lts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "16.04"
      },
      {
        "model": "linux lts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "14.04"
      },
      {
        "model": "linux esm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "sinema remote connect client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "1.0"
      },
      {
        "model": "software collections for rhel workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "software collections for rhel workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "software collections for rhel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "software collections for rhel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "software collections for rhel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "170"
      },
      {
        "model": "software collections for rhel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "17.6"
      },
      {
        "model": "software collections for rhel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "17.5"
      },
      {
        "model": "software collections for rhel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "17.4"
      },
      {
        "model": "software collections for rhel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "16"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.61"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.60"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.59"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.58"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.57"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.56.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.56"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.55.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.54.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.54"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.53.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.53"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.52"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.51"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.50.3"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.50.2"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.50.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.50"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.47"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.46"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.43"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.42.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.36"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.34"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.33"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.32"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.31"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.30"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.25"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.23"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.22"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.21"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.20"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.19.6"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.19.5"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.19.4"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.19.3"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.18.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.18"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.17"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.16.4"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.15.5"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.55.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.52.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.49.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.48.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.42.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.41.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.40.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.39"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.38.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.37.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.37.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.35.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.29.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.28.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.28.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.27.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.26.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.24.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.23.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.21.7"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.21.6"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.21.5"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.21.4"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.21.3"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.21.2"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.21.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.20.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.19.7"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.19.2"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.19.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.19.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.18.2"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.17.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.16.3"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.16.2"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.16.1"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.16.0"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.15.4"
      },
      {
        "model": "sinema remote connect client hf1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "2.0"
      },
      {
        "model": "libcurl",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "haxx",
        "version": "7.61.1"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "107835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "7.61.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Siemens ProductCERT reported these vulnerabilities to NCCIC.,Gentoo",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2018-14618",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2018-14618",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "secalert@redhat.com",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.6,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2018-14618",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2018-14618",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "secalert@redhat.com",
            "id": "CVE-2018-14618",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201809-215",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2018-14618",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2018-14618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.). curl Contains an integer overflow vulnerability. This vulnerability CVE-2017-8816 It is a similar problem.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. cURL/libcURL is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAttackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. \ncURL/libcURL version 7.15.4 through 7.61.0 are vulnerable. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201903-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: cURL: Multiple vulnerabilities\n     Date: March 10, 2019\n     Bugs: #665292, #670026, #677346\n       ID: 201903-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in cURL, the worst of which\ncould result in a Denial of Service condition. \n\nBackground\n==========\n\nA command line tool and library for transferring data with URLs. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-misc/curl                \u003c 7.64.0                  \u003e= 7.64.0 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in cURL. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nRemote attackers could cause a Denial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll cURL users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-misc/curl-7.64.0\"\n\nReferences\n==========\n\n[ 1 ] CVE-2018-14618\n      https://nvd.nist.gov/vuln/detail/CVE-2018-14618\n[ 2 ] CVE-2018-16839\n      https://nvd.nist.gov/vuln/detail/CVE-2018-16839\n[ 3 ] CVE-2018-16840\n      https://nvd.nist.gov/vuln/detail/CVE-2018-16840\n[ 4 ] CVE-2018-16842\n      https://nvd.nist.gov/vuln/detail/CVE-2018-16842\n[ 5 ] CVE-2019-3822\n      https://nvd.nist.gov/vuln/detail/CVE-2019-3822\n[ 6 ] CVE-2019-3823\n      https://nvd.nist.gov/vuln/detail/CVE-2019-3823\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201903-03\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2019 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. ==========================================================================\nUbuntu Security Notice USN-3765-2\nSeptember 17, 2018\n\ncurl vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\ncurl could be made to run arbitrary code if it received a specially\ncrafted input. This update provides\nthe corresponding update for Ubuntu 12.04 ESM. \n\nOriginal advisory details:\n\n It was discovered that curl incorrectly handled certain inputs. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n  curl                            7.22.0-3ubuntu4.23\n  libcurl3                        7.22.0-3ubuntu4.23\n  libcurl3-gnutls                 7.22.0-3ubuntu4.23\n  libcurl3-nss                    7.22.0-3ubuntu4.23\n\nIn general, a standard system update will make all the necessary\nchanges. 7) - aarch64, ppc64le, s390x\n\n3. Description:\n\nThe curl packages provide the libcurl library and the curl utility for\ndownloading files from servers using various protocols, including HTTP,\nFTP, and LDAP. \n\nSecurity Fix(es):\n\n* curl: NTLM password overflow via integer overflow (CVE-2018-14618)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* baseurl with file:// hangs and then timeout in yum repo (BZ#1709474)\n\n* curl crashes on http links with rate-limit (BZ#1711914)\n\n4. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/curl-7.61.1-i586-1_slack14.2.txz:  Upgraded. \n  For more information, see:\n    https://curl.haxx.se/docs/CVE-2018-14618.html\n    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/curl-7.61.1-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/curl-7.61.1-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/curl-7.61.1-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/curl-7.61.1-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/curl-7.61.1-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/curl-7.61.1-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/curl-7.61.1-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/curl-7.61.1-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.0 package:\nd6493074efefb47021747a0f525a3875  curl-7.61.1-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n9d5fb07395d570c7af54d306dff25e0d  curl-7.61.1-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\nfff7b1f0df80b7b8386e6b1b58fadaec  curl-7.61.1-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\nfe69bb3baaf679dec8bd3abea3c6ef02  curl-7.61.1-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\ne130826573cd1cf9b5d769690ff91811  curl-7.61.1-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n161e1f2949b0285484de8aa16953c5e7  curl-7.61.1-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n7135b216f6e989b0ae3e6123f6a07083  n/curl-7.61.1-i586-1.txz\n\nSlackware x86_64 -current package:\nb96ce6cdc7ae46e5979563f8f939fcfd  n/curl-7.61.1-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg curl-7.61.1-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: httpd24 security, bug fix, and enhancement update\nAdvisory ID:       RHSA-2018:3558-01\nProduct:           Red Hat Software Collections\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2018:3558\nIssue date:        2018-11-13\nCVE Names:         CVE-2016-5419 CVE-2016-5420 CVE-2016-5421 \n                   CVE-2016-7141 CVE-2016-7167 CVE-2016-8615 \n                   CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 \n                   CVE-2016-8619 CVE-2016-8620 CVE-2016-8621 \n                   CVE-2016-8622 CVE-2016-8623 CVE-2016-8624 \n                   CVE-2016-8625 CVE-2016-9586 CVE-2017-7407 \n                   CVE-2017-8816 CVE-2017-8817 CVE-2017-15710 \n                   CVE-2017-15715 CVE-2017-1000100 CVE-2017-1000101 \n                   CVE-2017-1000254 CVE-2017-1000257 CVE-2018-1283 \n                   CVE-2018-1301 CVE-2018-1303 CVE-2018-1312 \n                   CVE-2018-1333 CVE-2018-11763 CVE-2018-14618 \n                   CVE-2018-1000007 CVE-2018-1000120 CVE-2018-1000121 \n                   CVE-2018-1000122 CVE-2018-1000301 \n=====================================================================\n\n1. Summary:\n\nAn update for httpd24-httpd, httpd24-nghttp2, and httpd24-curl is now\navailable for Red Hat Software Collections. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\n\n3. Description:\n\nThe Apache HTTP Server is a powerful, efficient, and extensible web server. \nThe httpd24 packages provide a recent stable release of version 2.4 of the\nApache HTTP Server, along with the mod_auth_kerb module. \n\nThe following packages have been upgraded to a later upstream version:\nhttpd24-httpd (2.4.34), httpd24-curl (7.61.1). (BZ#1590833, BZ#1648928)\n\nSecurity Fix(es):\n\n* httpd: Improper handling of headers in mod_session can allow a remote\nuser to modify session data for CGI applications (CVE-2018-1283)\n\n* httpd: Out of bounds read in mod_cache_socache can allow a remote\nattacker to cause DoS (CVE-2018-1303)\n\n* httpd: mod_http2: Too much time allocated to workers, possibly leading to\nDoS (CVE-2018-1333)\n\n* httpd: DoS for HTTP/2 connections by continuous SETTINGS frames\n(CVE-2018-11763)\n\n* httpd: Out of bounds write in mod_authnz_ldap when using too small\nAccept-Language values (CVE-2017-15710)\n\n* httpd: \u003cFilesMatch\u003e bypass with a trailing newline in the file name\n(CVE-2017-15715)\n\n* httpd: Out of bounds access after failure in reading the HTTP request\n(CVE-2018-1301)\n\n* httpd: Weak Digest auth nonce generation in mod_auth_digest\n(CVE-2018-1312)\n\n* curl: Multiple security issues were fixed in httpd24-curl (CVE-2016-5419,\nCVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615,\nCVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620,\nCVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625,\nCVE-2016-9586, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000254,\nCVE-2017-1000257, CVE-2017-7407, CVE-2017-8816, CVE-2017-8817,\nCVE-2018-1000007, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122,\nCVE-2018-1000301, CVE-2018-14618)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nRed Hat would like to thank the Curl project for reporting CVE-2017-8816,\nCVE-2017-8817, CVE-2017-1000254, CVE-2017-1000257, CVE-2018-1000007,\nCVE-2018-1000120, CVE-2018-1000122, CVE-2018-1000301, CVE-2016-9586,\nCVE-2017-1000100, CVE-2017-1000101, CVE-2018-14618, and CVE-2018-1000121. \nUpstream acknowledges Alex Nichols as the original reporter of\nCVE-2017-8816; the OSS-Fuzz project as the original reporter of\nCVE-2017-8817 and CVE-2018-1000301; Max Dymond as the original reporter of\nCVE-2017-1000254 and CVE-2018-1000122; Brian Carpenter and the OSS-Fuzz\nproject as the original reporters of CVE-2017-1000257; Craig de Stigter as\nthe original reporter of CVE-2018-1000007; Duy Phan Thanh as the original\nreporter of CVE-2018-1000120; Even Rouault as the original reporter of\nCVE-2017-1000100; Brian Carpenter as the original reporter of\nCVE-2017-1000101; Zhaoyang Wu as the original reporter of CVE-2018-14618;\nand Dario Weisser as the original reporter of CVE-2018-1000121. \n\nBug Fix(es):\n\n* Previously, the Apache HTTP Server from the httpd24 Software Collection\nwas unable to handle situations when static content was repeatedly\nrequested in a browser by refreshing the page. As a consequence, HTTP/2\nconnections timed out and httpd became unresponsive. This bug has been\nfixed, and HTTP/2 connections now work as expected in the described\nscenario. (BZ#1518737)\n\nEnhancement(s):\n\n* This update adds the mod_md module to the httpd24 Software Collection. \nThis module enables managing domains across virtual hosts and certificate\nprovisioning using the Automatic Certificate Management Environment (ACME)\nprotocol. The mod_md module is available only for Red Hat Enterprise Linux\n7. (BZ#1640722)\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nSoftware Collections 3.2 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1362183 - CVE-2016-5419 curl: TLS session resumption client cert bypass\n1362190 - CVE-2016-5420 curl: Re-using connection with wrong client cert\n1362199 - CVE-2016-5421 curl: Use of connection struct after free\n1373229 - CVE-2016-7141 curl: Incorrect reuse of client certificates\n1375906 - CVE-2016-7167 curl: escape and unescape integer overflows\n1388370 - CVE-2016-8615 curl: Cookie injection for other servers\n1388371 - CVE-2016-8616 curl: Case insensitive password comparison\n1388377 - CVE-2016-8617 curl: Out-of-bounds write via unchecked multiplication\n1388378 - CVE-2016-8618 curl: Double-free in curl_maprintf\n1388379 - CVE-2016-8619 curl: Double-free in krb5 code\n1388382 - CVE-2016-8620 curl: Glob parser write/read out of bounds\n1388385 - CVE-2016-8621 curl: curl_getdate out-of-bounds read\n1388386 - CVE-2016-8622 curl: URL unescape heap overflow via integer truncation\n1388388 - CVE-2016-8623 curl: Use-after-free via shared cookies\n1388390 - CVE-2016-8624 curl: Invalid URL parsing with \u0027#\u0027\n1388392 - CVE-2016-8625 curl: IDNA 2003 makes curl use wrong host\n1406712 - CVE-2016-9586 curl: printf floating point buffer overflow\n1439190 - CVE-2017-7407 curl: --write-out out of bounds read\n1478309 - CVE-2017-1000101 curl: URL globbing out of bounds read\n1478310 - CVE-2017-1000100 curl: TFTP sends more than buffer size\n1495541 - CVE-2017-1000254 curl: FTP PWD response parser out of bounds read\n1503705 - CVE-2017-1000257 curl: IMAP FETCH response out of bounds read\n1515757 - CVE-2017-8816 curl: NTLM buffer overflow via integer overflow\n1515760 - CVE-2017-8817 curl: FTP wildcard out of bounds read\n1518737 - HTTP/2 connections hang and timeout\n1537125 - CVE-2018-1000007 curl: HTTP authentication leak in redirects\n1540167 - provides without httpd24 pre/in-fix\n1552628 - CVE-2018-1000120 curl: FTP path trickery leads to NIL byte out of bounds write\n1552631 - CVE-2018-1000121 curl: LDAP NULL pointer dereference\n1553398 - CVE-2018-1000122 curl: RTSP RTP buffer over-read\n1558450 - Not able to use SSLOpenSSLConfCmd with httpd24-httpd-2.4.27. \n1560395 - CVE-2018-1283 httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications\n1560399 - CVE-2018-1303 httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS\n1560599 - CVE-2017-15710 httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values\n1560614 - CVE-2017-15715 httpd: \u003cFilesMatch\u003e bypass with a trailing newline in the file name\n1560634 - CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest\n1560643 - CVE-2018-1301 httpd: Out of bounds access after failure in reading the HTTP request\n1575536 - CVE-2018-1000301 curl: Out-of-bounds heap read when missing RTSP headers allows information leak of denial of service\n1605048 - CVE-2018-1333 httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS\n1622707 - CVE-2018-14618 curl: NTLM password overflow via integer overflow\n1628389 - Make OCSP more configurable (like CRL)\n1633260 - mod_session missing apr-util-openssl\n1633399 - CVE-2018-11763 httpd: DoS for HTTP/2 connections by continuous SETTINGS frames\n1634830 - FTBFS: httpd24-httpd\n1640722 - mod_md is missing in httpd24-httpd\n1646937 - Unable to start httpd\n1648928 - Rebase curl to the latest version\n\n6. Package List:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):\n\nSource:\nhttpd24-curl-7.61.1-1.el6.src.rpm\nhttpd24-httpd-2.4.34-7.el6.src.rpm\nhttpd24-nghttp2-1.7.1-7.el6.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.34-7.el6.noarch.rpm\n\nx86_64:\nhttpd24-curl-7.61.1-1.el6.x86_64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el6.x86_64.rpm\nhttpd24-httpd-2.4.34-7.el6.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el6.x86_64.rpm\nhttpd24-httpd-devel-2.4.34-7.el6.x86_64.rpm\nhttpd24-httpd-tools-2.4.34-7.el6.x86_64.rpm\nhttpd24-libcurl-7.61.1-1.el6.x86_64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el6.x86_64.rpm\nhttpd24-libnghttp2-1.7.1-7.el6.x86_64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el6.x86_64.rpm\nhttpd24-mod_ldap-2.4.34-7.el6.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el6.x86_64.rpm\nhttpd24-mod_session-2.4.34-7.el6.x86_64.rpm\nhttpd24-mod_ssl-2.4.34-7.el6.x86_64.rpm\nhttpd24-nghttp2-1.7.1-7.el6.x86_64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el6.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nhttpd24-curl-7.61.1-1.el6.src.rpm\nhttpd24-httpd-2.4.34-7.el6.src.rpm\nhttpd24-nghttp2-1.7.1-7.el6.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.34-7.el6.noarch.rpm\n\nx86_64:\nhttpd24-curl-7.61.1-1.el6.x86_64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el6.x86_64.rpm\nhttpd24-httpd-2.4.34-7.el6.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el6.x86_64.rpm\nhttpd24-httpd-devel-2.4.34-7.el6.x86_64.rpm\nhttpd24-httpd-tools-2.4.34-7.el6.x86_64.rpm\nhttpd24-libcurl-7.61.1-1.el6.x86_64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el6.x86_64.rpm\nhttpd24-libnghttp2-1.7.1-7.el6.x86_64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el6.x86_64.rpm\nhttpd24-mod_ldap-2.4.34-7.el6.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el6.x86_64.rpm\nhttpd24-mod_session-2.4.34-7.el6.x86_64.rpm\nhttpd24-mod_ssl-2.4.34-7.el6.x86_64.rpm\nhttpd24-nghttp2-1.7.1-7.el6.x86_64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el6.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nhttpd24-curl-7.61.1-1.el7.src.rpm\nhttpd24-httpd-2.4.34-7.el7.src.rpm\nhttpd24-nghttp2-1.7.1-7.el7.src.rpm\n\naarch64:\nhttpd24-curl-7.61.1-1.el7.aarch64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.aarch64.rpm\nhttpd24-httpd-2.4.34-7.el7.aarch64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.aarch64.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.aarch64.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.aarch64.rpm\nhttpd24-libcurl-7.61.1-1.el7.aarch64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.aarch64.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.aarch64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.aarch64.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.aarch64.rpm\nhttpd24-mod_md-2.4.34-7.el7.aarch64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.aarch64.rpm\nhttpd24-mod_session-2.4.34-7.el7.aarch64.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.aarch64.rpm\nhttpd24-nghttp2-1.7.1-7.el7.aarch64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.aarch64.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.34-7.el7.noarch.rpm\n\nppc64le:\nhttpd24-curl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm\nhttpd24-httpd-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm\nhttpd24-libcurl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_md-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_session-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm\nhttpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm\n\ns390x:\nhttpd24-curl-7.61.1-1.el7.s390x.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm\nhttpd24-httpd-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.s390x.rpm\nhttpd24-libcurl-7.61.1-1.el7.s390x.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_md-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_session-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.s390x.rpm\nhttpd24-nghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nhttpd24-curl-7.61.1-1.el7.src.rpm\nhttpd24-httpd-2.4.34-7.el7.src.rpm\nhttpd24-nghttp2-1.7.1-7.el7.src.rpm\n\naarch64:\nhttpd24-curl-7.61.1-1.el7.aarch64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.aarch64.rpm\nhttpd24-httpd-2.4.34-7.el7.aarch64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.aarch64.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.aarch64.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.aarch64.rpm\nhttpd24-libcurl-7.61.1-1.el7.aarch64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.aarch64.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.aarch64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.aarch64.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.aarch64.rpm\nhttpd24-mod_md-2.4.34-7.el7.aarch64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.aarch64.rpm\nhttpd24-mod_session-2.4.34-7.el7.aarch64.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.aarch64.rpm\nhttpd24-nghttp2-1.7.1-7.el7.aarch64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.aarch64.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.34-7.el7.noarch.rpm\n\nppc64le:\nhttpd24-curl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm\nhttpd24-httpd-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm\nhttpd24-libcurl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_md-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_session-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm\nhttpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm\n\ns390x:\nhttpd24-curl-7.61.1-1.el7.s390x.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm\nhttpd24-httpd-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.s390x.rpm\nhttpd24-libcurl-7.61.1-1.el7.s390x.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_md-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_session-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.s390x.rpm\nhttpd24-nghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm\n\nx86_64:\nhttpd24-curl-7.61.1-1.el7.x86_64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm\nhttpd24-httpd-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm\nhttpd24-libcurl-7.61.1-1.el7.x86_64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_md-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_session-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm\nhttpd24-nghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):\n\nSource:\nhttpd24-curl-7.61.1-1.el7.src.rpm\nhttpd24-httpd-2.4.34-7.el7.src.rpm\nhttpd24-nghttp2-1.7.1-7.el7.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.34-7.el7.noarch.rpm\n\nppc64le:\nhttpd24-curl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm\nhttpd24-httpd-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm\nhttpd24-libcurl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_md-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_session-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm\nhttpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm\n\ns390x:\nhttpd24-curl-7.61.1-1.el7.s390x.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm\nhttpd24-httpd-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.s390x.rpm\nhttpd24-libcurl-7.61.1-1.el7.s390x.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_md-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_session-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.s390x.rpm\nhttpd24-nghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm\n\nx86_64:\nhttpd24-curl-7.61.1-1.el7.x86_64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm\nhttpd24-httpd-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm\nhttpd24-libcurl-7.61.1-1.el7.x86_64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_md-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_session-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm\nhttpd24-nghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):\n\nSource:\nhttpd24-curl-7.61.1-1.el7.src.rpm\nhttpd24-httpd-2.4.34-7.el7.src.rpm\nhttpd24-nghttp2-1.7.1-7.el7.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.34-7.el7.noarch.rpm\n\nppc64le:\nhttpd24-curl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm\nhttpd24-httpd-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm\nhttpd24-libcurl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_md-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_session-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm\nhttpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm\n\ns390x:\nhttpd24-curl-7.61.1-1.el7.s390x.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm\nhttpd24-httpd-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.s390x.rpm\nhttpd24-libcurl-7.61.1-1.el7.s390x.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_md-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_session-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.s390x.rpm\nhttpd24-nghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm\n\nx86_64:\nhttpd24-curl-7.61.1-1.el7.x86_64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm\nhttpd24-httpd-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm\nhttpd24-libcurl-7.61.1-1.el7.x86_64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_md-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_session-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm\nhttpd24-nghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):\n\nSource:\nhttpd24-curl-7.61.1-1.el7.src.rpm\nhttpd24-httpd-2.4.34-7.el7.src.rpm\nhttpd24-nghttp2-1.7.1-7.el7.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.34-7.el7.noarch.rpm\n\nppc64le:\nhttpd24-curl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.ppc64le.rpm\nhttpd24-httpd-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.ppc64le.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.ppc64le.rpm\nhttpd24-libcurl-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.ppc64le.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.ppc64le.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_md-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_session-2.4.34-7.el7.ppc64le.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.ppc64le.rpm\nhttpd24-nghttp2-1.7.1-7.el7.ppc64le.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.ppc64le.rpm\n\ns390x:\nhttpd24-curl-7.61.1-1.el7.s390x.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.s390x.rpm\nhttpd24-httpd-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.s390x.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.s390x.rpm\nhttpd24-libcurl-7.61.1-1.el7.s390x.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.s390x.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.s390x.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_md-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_session-2.4.34-7.el7.s390x.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.s390x.rpm\nhttpd24-nghttp2-1.7.1-7.el7.s390x.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.s390x.rpm\n\nx86_64:\nhttpd24-curl-7.61.1-1.el7.x86_64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm\nhttpd24-httpd-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm\nhttpd24-libcurl-7.61.1-1.el7.x86_64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_md-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_session-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm\nhttpd24-nghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nhttpd24-curl-7.61.1-1.el7.src.rpm\nhttpd24-httpd-2.4.34-7.el7.src.rpm\nhttpd24-nghttp2-1.7.1-7.el7.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.34-7.el7.noarch.rpm\n\nx86_64:\nhttpd24-curl-7.61.1-1.el7.x86_64.rpm\nhttpd24-curl-debuginfo-7.61.1-1.el7.x86_64.rpm\nhttpd24-httpd-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-devel-2.4.34-7.el7.x86_64.rpm\nhttpd24-httpd-tools-2.4.34-7.el7.x86_64.rpm\nhttpd24-libcurl-7.61.1-1.el7.x86_64.rpm\nhttpd24-libcurl-devel-7.61.1-1.el7.x86_64.rpm\nhttpd24-libnghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-libnghttp2-devel-1.7.1-7.el7.x86_64.rpm\nhttpd24-mod_ldap-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_md-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_session-2.4.34-7.el7.x86_64.rpm\nhttpd24-mod_ssl-2.4.34-7.el7.x86_64.rpm\nhttpd24-nghttp2-1.7.1-7.el7.x86_64.rpm\nhttpd24-nghttp2-debuginfo-1.7.1-7.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-5419\nhttps://access.redhat.com/security/cve/CVE-2016-5420\nhttps://access.redhat.com/security/cve/CVE-2016-5421\nhttps://access.redhat.com/security/cve/CVE-2016-7141\nhttps://access.redhat.com/security/cve/CVE-2016-7167\nhttps://access.redhat.com/security/cve/CVE-2016-8615\nhttps://access.redhat.com/security/cve/CVE-2016-8616\nhttps://access.redhat.com/security/cve/CVE-2016-8617\nhttps://access.redhat.com/security/cve/CVE-2016-8618\nhttps://access.redhat.com/security/cve/CVE-2016-8619\nhttps://access.redhat.com/security/cve/CVE-2016-8620\nhttps://access.redhat.com/security/cve/CVE-2016-8621\nhttps://access.redhat.com/security/cve/CVE-2016-8622\nhttps://access.redhat.com/security/cve/CVE-2016-8623\nhttps://access.redhat.com/security/cve/CVE-2016-8624\nhttps://access.redhat.com/security/cve/CVE-2016-8625\nhttps://access.redhat.com/security/cve/CVE-2016-9586\nhttps://access.redhat.com/security/cve/CVE-2017-7407\nhttps://access.redhat.com/security/cve/CVE-2017-8816\nhttps://access.redhat.com/security/cve/CVE-2017-8817\nhttps://access.redhat.com/security/cve/CVE-2017-15710\nhttps://access.redhat.com/security/cve/CVE-2017-15715\nhttps://access.redhat.com/security/cve/CVE-2017-1000100\nhttps://access.redhat.com/security/cve/CVE-2017-1000101\nhttps://access.redhat.com/security/cve/CVE-2017-1000254\nhttps://access.redhat.com/security/cve/CVE-2017-1000257\nhttps://access.redhat.com/security/cve/CVE-2018-1283\nhttps://access.redhat.com/security/cve/CVE-2018-1301\nhttps://access.redhat.com/security/cve/CVE-2018-1303\nhttps://access.redhat.com/security/cve/CVE-2018-1312\nhttps://access.redhat.com/security/cve/CVE-2018-1333\nhttps://access.redhat.com/security/cve/CVE-2018-11763\nhttps://access.redhat.com/security/cve/CVE-2018-14618\nhttps://access.redhat.com/security/cve/CVE-2018-1000007\nhttps://access.redhat.com/security/cve/CVE-2018-1000120\nhttps://access.redhat.com/security/cve/CVE-2018-1000121\nhttps://access.redhat.com/security/cve/CVE-2018-1000122\nhttps://access.redhat.com/security/cve/CVE-2018-1000301\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_software_collections/3/html/3.2_release_notes/chap-rhscl#sect-RHSCL-Changes-httpd\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBW+qMytzjgjWX9erEAQgLzQ//V6p0MJlmHHuvBRYszVGnu43cqKkSzERl\nvPJnEBEdzaU1+hxnBpN+PwWRp+X0j7EIgEnc3yBMSqnKnZUXhbW+2AlWKFSu96i1\nWcDdaxtFkD8opjERjN+ckuOnk2Eh24eWAYoDIn0WqTR7seOdvdXsURROOyvugwXP\nulGH+RQhwyxBYvYKp1RmX+REgKfW99wMxpd7B4depYhsI5ZkTzhyTbnp2E+v/XpY\nr8NqBJEV0C69sHrddBjvDMl+M0vwPw0X1YWEGsP20tZ3nqGPCVlCegQ+WCUU36HH\n1Asxa1s2/50vlY5Aa79iJuAlotw/qy4Cxvm98A33ImBvI1WMfoRXmmkOYcOsTP3o\n38fkPK4XuDiimWj+ODq29WsqvjJTZgCD32lw7MgjeyH+0u4aMYnImRtC7tG2ykRU\nETXqLCnQ1I1We2ar3vI9xYLJ+wmc/Iy479eDWziiQztO2RusHxXTStt2n5XEGg1Z\nylahAIyX989zJ3UcSs2h8dbMqjFzHZtie6xEtgFH8fsaPr36HjvKrTzj9rIN2xgt\nD1EcxjUVJRp536TzS5ULmAQSAfURruq6xTyuxI9+nDNfFXJbKI5IxIR1W6jkVIMD\nN1asv6UUHNzFmJgnmd94AlqDK2iCdoZBwmosk6ICcBmJVrWPMXjBDGNS3GtbKOdj\nRkKELMK+M5A=\n=7w7/\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "db": "BID",
        "id": "107835"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-14618"
      },
      {
        "db": "PACKETSTORM",
        "id": "152034"
      },
      {
        "db": "PACKETSTORM",
        "id": "149396"
      },
      {
        "db": "PACKETSTORM",
        "id": "149395"
      },
      {
        "db": "PACKETSTORM",
        "id": "153792"
      },
      {
        "db": "PACKETSTORM",
        "id": "149249"
      },
      {
        "db": "PACKETSTORM",
        "id": "150307"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-14618",
        "trust": 3.4
      },
      {
        "db": "SIEMENS",
        "id": "SSA-436177",
        "trust": 2.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-099-04",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1041605",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "152034",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.0783",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.0795",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.0473",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "107835",
        "trust": 0.3
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-14618",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "149396",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "149395",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "153792",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "149249",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "150307",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2018-14618"
      },
      {
        "db": "BID",
        "id": "107835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "db": "PACKETSTORM",
        "id": "152034"
      },
      {
        "db": "PACKETSTORM",
        "id": "149396"
      },
      {
        "db": "PACKETSTORM",
        "id": "149395"
      },
      {
        "db": "PACKETSTORM",
        "id": "153792"
      },
      {
        "db": "PACKETSTORM",
        "id": "149249"
      },
      {
        "db": "PACKETSTORM",
        "id": "150307"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "id": "VAR-201809-0686",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.68333334
  },
  "last_update_date": "2024-07-23T20:17:09.201000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "DSA-4286",
        "trust": 0.8,
        "url": "https://www.debian.org/security/2018/dsa-4286"
      },
      {
        "title": "Bug 1622707",
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2018-14618"
      },
      {
        "title": "RHSA-2018:3558",
        "trust": 0.8,
        "url": "https://access.redhat.com/errata/rhsa-2018:3558"
      },
      {
        "title": "NTLM password overflow via integer overflow",
        "trust": 0.8,
        "url": "https://curl.haxx.se/docs/cve-2018-14618.html"
      },
      {
        "title": "USN-3765-1",
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/3765-1/"
      },
      {
        "title": "USN-3765-2",
        "trust": 0.8,
        "url": "https://usn.ubuntu.com/3765-2/"
      },
      {
        "title": "Haxx curl Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=84547"
      },
      {
        "title": "Red Hat: Low: curl security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20191880 - security advisory"
      },
      {
        "title": "Ubuntu Security Notice: curl vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3765-1"
      },
      {
        "title": "Ubuntu Security Notice: curl vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3765-2"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2018-1112",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2018-1112"
      },
      {
        "title": "Red Hat: CVE-2018-14618",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2018-14618"
      },
      {
        "title": "IBM: IBM Security Bulletin: IBM Dynamic System Analysis (DSA) Preboot is affected by vulnerability in cURL (CVE-2018-14618)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=a1829bb84184b37e71ea49829931b07f"
      },
      {
        "title": "Debian CVElist Bug Report Logs: curl: CVE-2018-14618: NTLM password overflow via integer overflow",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=bcc124abe94afd85dbaa24ccf7746c39"
      },
      {
        "title": "IBM: IBM Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by vulnerabilities in cURL (CVE-2018-14618 CVE-2018-16840 CVE-2018-16842)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=7531c7915b1d94fd00f2e04e9f32c65b"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2018-1135",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2018-1135"
      },
      {
        "title": "IBM: IBM Security Bulletin: Security Vulnerabilities affect IBM Cloud Private Storage \u2013 GlusterFS and Minio",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=7fea8e095b9e5b4078d6992b0167a6bc"
      },
      {
        "title": "IBM: IBM Security Bulletin: Security Vulnerabilities affect IBM Cloud Private Monitoring",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=07514a487c5c08ab5176c6cdf0fd6ac5"
      },
      {
        "title": "IBM: IBM Security Bulletin: BigFix Platform 9.5.x / 9.2.x affected by multiple vulnerabilities (CVE-2018-0732, CVE-2018-0737, CVE-2018-14618, CVE-2018-1000301)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=443b53fd5630b4348dc744a4e12c5e7e"
      },
      {
        "title": "Red Hat: Moderate: httpd24 security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20183558 - security advisory"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=8a056bd2177d12192b11798b7ac3e013"
      },
      {
        "title": "IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been addressed in IBM Security Access Manager Appliance",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=800337bc69aa7ad92ac88a2adcc7d426"
      },
      {
        "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=2196fa008592287290cbd6678fbe10d4"
      },
      {
        "title": "IBM: IBM Security Bulletin: Multiple Security Vulnerabilities affect IBM\u00ae Cloud Private \u2013 fluentd",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=60de0933c28b353f38df30120aa2a908"
      },
      {
        "title": "IBM: IBM Security Bulletin: IBM API Connect has addressed multiple vulnerabilities in Developer Portal\u2019s dependencies \u2013 Cumulative list from June 28, 2018 to December 13, 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=43da2cd72c1e378d8d94ecec029fcc61"
      },
      {
        "title": "enforcer",
        "trust": 0.1,
        "url": "https://github.com/ibrokethecloud/enforcer "
      },
      {
        "title": "TrivyWeb",
        "trust": 0.1,
        "url": "https://github.com/korayagaya/trivyweb "
      },
      {
        "title": "github_aquasecurity_trivy",
        "trust": 0.1,
        "url": "https://github.com/back8/github_aquasecurity_trivy "
      },
      {
        "title": "Vulnerability-Scanner-for-Containers",
        "trust": 0.1,
        "url": "https://github.com/t31m0/vulnerability-scanner-for-containers "
      },
      {
        "title": "security",
        "trust": 0.1,
        "url": "https://github.com/umahari/security "
      },
      {
        "title": "trivy",
        "trust": 0.1,
        "url": "https://github.com/siddharthraopotukuchi/trivy "
      },
      {
        "title": "trivy",
        "trust": 0.1,
        "url": "https://github.com/simiyo/trivy "
      },
      {
        "title": "trivy",
        "trust": 0.1,
        "url": "https://github.com/aquasecurity/trivy "
      },
      {
        "title": "trivy",
        "trust": 0.1,
        "url": "https://github.com/knqyf263/trivy "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2018-14618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-190",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "https://curl.haxx.se/docs/cve-2018-14618.html"
      },
      {
        "trust": 2.1,
        "url": "https://usn.ubuntu.com/3765-1/"
      },
      {
        "trust": 2.1,
        "url": "https://access.redhat.com/errata/rhsa-2018:3558"
      },
      {
        "trust": 2.0,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2018-14618"
      },
      {
        "trust": 2.0,
        "url": "https://www.debian.org/security/2018/dsa-4286"
      },
      {
        "trust": 2.0,
        "url": "https://usn.ubuntu.com/3765-2/"
      },
      {
        "trust": 2.0,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://security.gentoo.org/glsa/201903-03"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1041605"
      },
      {
        "trust": 1.7,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0014"
      },
      {
        "trust": 1.3,
        "url": "https://access.redhat.com/errata/rhsa-2019:1880"
      },
      {
        "trust": 1.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14618"
      },
      {
        "trust": 0.9,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-14618"
      },
      {
        "trust": 0.8,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-099-04"
      },
      {
        "trust": 0.6,
        "url": "http://www.ibm.com/support/docview.wss"
      },
      {
        "trust": 0.6,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-19-099-04"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/76910"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/76998"
      },
      {
        "trust": 0.6,
        "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10870676"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-curl-affects-ibm-cloud-pak-system-cve-2018-14618/"
      },
      {
        "trust": 0.6,
        "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10870936"
      },
      {
        "trust": 0.6,
        "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10791573"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/1173136"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/152034/gentoo-linux-security-advisory-201903-03.html"
      },
      {
        "trust": 0.6,
        "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10791553"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/1143490"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/75618"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2018-14618"
      },
      {
        "trust": 0.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-099-04"
      },
      {
        "trust": 0.3,
        "url": "https://github.com/curl/curl/commit/57d299a499155d4b327e341c6024e293b0418243.patch"
      },
      {
        "trust": 0.3,
        "url": "http://curl.haxx.se/"
      },
      {
        "trust": 0.3,
        "url": "https://github.com/falconindy/curl/commit/e6c2dea7ddd2ed63a78576b176fdbd0b3f132e31"
      },
      {
        "trust": 0.2,
        "url": "https://usn.ubuntu.com/usn/usn-3765-1"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.2,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/190.html"
      },
      {
        "trust": 0.1,
        "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=58865"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16842"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3822"
      },
      {
        "trust": 0.1,
        "url": "https://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16840"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3823"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16839"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/usn/usn-3765-2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.3"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.9"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.17"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com"
      },
      {
        "trust": 0.1,
        "url": "http://osuosl.org)"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/gpg-key"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8624"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-8816"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9586"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1301"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8624"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8625"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000007"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-15710"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-8816"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-1000254"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8619"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8617"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1000120"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-8817"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8616"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1000301"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-15715"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_software_collections/3/html/3.2_release_notes/chap-rhscl#sect-rhscl-changes-httpd"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-7407"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5419"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000100"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-5421"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8617"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8616"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-9586"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1312"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1333"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8620"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7141"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1303"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1000007"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-5419"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5420"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8619"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1000121"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8620"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-1000101"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-7167"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1000122"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8621"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5421"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8622"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000257"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-1000257"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8622"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000101"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-8817"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000254"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-5420"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-7141"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8615"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15710"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8618"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8615"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8625"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-1283"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-1000100"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8623"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-11763"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7167"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8621"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15715"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7407"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-8623"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8618"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2018-14618"
      },
      {
        "db": "BID",
        "id": "107835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "db": "PACKETSTORM",
        "id": "152034"
      },
      {
        "db": "PACKETSTORM",
        "id": "149396"
      },
      {
        "db": "PACKETSTORM",
        "id": "149395"
      },
      {
        "db": "PACKETSTORM",
        "id": "153792"
      },
      {
        "db": "PACKETSTORM",
        "id": "149249"
      },
      {
        "db": "PACKETSTORM",
        "id": "150307"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2018-14618"
      },
      {
        "db": "BID",
        "id": "107835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "db": "PACKETSTORM",
        "id": "152034"
      },
      {
        "db": "PACKETSTORM",
        "id": "149396"
      },
      {
        "db": "PACKETSTORM",
        "id": "149395"
      },
      {
        "db": "PACKETSTORM",
        "id": "153792"
      },
      {
        "db": "PACKETSTORM",
        "id": "149249"
      },
      {
        "db": "PACKETSTORM",
        "id": "150307"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-09-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-14618"
      },
      {
        "date": "2018-09-05T00:00:00",
        "db": "BID",
        "id": "107835"
      },
      {
        "date": "2019-02-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "date": "2019-03-11T18:48:31",
        "db": "PACKETSTORM",
        "id": "152034"
      },
      {
        "date": "2018-09-17T23:44:00",
        "db": "PACKETSTORM",
        "id": "149396"
      },
      {
        "date": "2018-09-17T23:23:00",
        "db": "PACKETSTORM",
        "id": "149395"
      },
      {
        "date": "2019-07-29T18:57:40",
        "db": "PACKETSTORM",
        "id": "153792"
      },
      {
        "date": "2018-09-06T14:15:01",
        "db": "PACKETSTORM",
        "id": "149249"
      },
      {
        "date": "2018-11-13T18:02:16",
        "db": "PACKETSTORM",
        "id": "150307"
      },
      {
        "date": "2018-09-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      },
      {
        "date": "2018-09-05T19:29:00.420000",
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-04-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-14618"
      },
      {
        "date": "2018-09-05T00:00:00",
        "db": "BID",
        "id": "107835"
      },
      {
        "date": "2019-07-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      },
      {
        "date": "2021-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      },
      {
        "date": "2019-04-22T17:48:00.643000",
        "db": "NVD",
        "id": "CVE-2018-14618"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "curl Integer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013634"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-215"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.