Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-24795 (GCVE-0-2024-24795)
Vulnerability from cvelistv5 – Published: 2024-04-04 19:20 – Updated: 2024-11-12 19:48- CWE-113 - Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server |
Affected:
2.4.0 , ≤ 2.4.58
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-24795",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-12T19:38:36.908335Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-12T19:48:20.007Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T23:28:12.660Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/04/04/5"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT214119"
},
{
"tags": [
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2024/Jul/18"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Apache HTTP Server",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThanOrEqual": "2.4.58",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Keran Mu, Tsinghua University and Zhongguancun Laboratory."
},
{
"lang": "en",
"type": "finder",
"value": "Jianjun Chen, Tsinghua University and Zhongguancun Laboratory."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\u003cbr\u003e\u003cbr\u003eUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
}
],
"value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
}
],
"metrics": [
{
"other": {
"content": {
"text": "low"
},
"type": "Textual description of severity"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-113",
"description": "CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Response Splitting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T12:16:15.822Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"timeline": [
{
"lang": "en",
"time": "2023-09-06T11:37:00.000Z",
"value": "Reported to security team"
}
],
"title": "Apache HTTP Server: HTTP Response Splitting in multiple modules",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2024-24795",
"datePublished": "2024-04-04T19:20:48.803Z",
"dateReserved": "2024-01-31T13:49:58.441Z",
"dateUpdated": "2024-11-12T19:48:20.007Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-24795\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-04-04T20:15:08.663\",\"lastModified\":\"2025-06-30T12:55:47.280\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\\n\\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.\"},{\"lang\":\"es\",\"value\":\"La divisi\u00f3n de la respuesta HTTP en varios m\u00f3dulos en el servidor HTTP Apache permite que un atacante pueda inyectar encabezados de respuesta maliciosos en aplicaciones backend para provocar un ataque de desincronizaci\u00f3n HTTP. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.59, que soluciona este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-113\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndExcluding\":\"2.4.59\",\"matchCriteriaId\":\"D18D7BEC-F363-44D3-8926-B3042AFC1E50\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA277A6C-83EC-4536-9125-97B84C4FAF59\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20333EE-4C13-426E-8B54-D78679D5DDB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"5333B745-F7A3-46CB-8437-8668DB08CD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046FB51E-B768-44D3-AEB5-D857145CA840\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.6\",\"matchCriteriaId\":\"687902EF-637F-4537-B419-15A1695370B9\"}]}]}],\"references\":[{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2024/Jul/18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/04/04/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240415-0013/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT214119\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240415-0013/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/04/04/5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT214119\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2024/Jul/18\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:28:12.660Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-24795\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-12T19:38:36.908335Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-444\", \"description\": \"CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:22.709Z\"}}], \"cna\": {\"title\": \"Apache HTTP Server: HTTP Response Splitting in multiple modules\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Keran Mu, Tsinghua University and Zhongguancun Laboratory.\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Jianjun Chen, Tsinghua University and Zhongguancun Laboratory.\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"low\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache HTTP Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.4.58\"}], \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-09-06T11:37:00.000Z\", \"value\": \"Reported to security team\"}], \"references\": [{\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\\n\\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\u003cbr\u003e\u003cbr\u003eUsers are recommended to upgrade to version 2.4.59, which fixes this issue.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-113\", \"description\": \"CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Response Splitting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2024-10-03T12:16:15.822Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-24795\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-12T19:48:20.007Z\", \"dateReserved\": \"2024-01-31T13:49:58.441Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2024-04-04T19:20:48.803Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-0274
Vulnerability from certfr_avis - Published: 2024-04-05 - Updated: 2024-04-05
De multiples vulnérabilités ont été découvertes dans Apache HTTP Server. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apache | HTTP Server | HTTP Server version antérieures à 2.4.59 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HTTP Server version ant\u00e9rieures \u00e0 2.4.59",
"product": {
"name": "HTTP Server",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2023-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38709"
},
{
"name": "CVE-2024-27316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27316"
}
],
"initial_release_date": "2024-04-05T00:00:00",
"last_revision_date": "2024-04-05T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0274",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eApache HTTP Server\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, un contournement\nde la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apache HTTP Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apache HTTP Server du 04 avril 2024",
"url": "https://downloads.apache.org/httpd/CHANGES_2.4.59"
}
]
}
CERTFR-2025-AVI-0855
Vulnerability from certfr_avis - Published: 2025-10-09 - Updated: 2025-10-09
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 24.4 antérieures à 24.4R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 22.4R3-S8-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4 antérieures à 23.4R2-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S4-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 22.4R3-S8 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-S2-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.4-EVO antérieures à 24.4R2-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 24.1R4 | ||
| Juniper Networks | Security Director | Security Director Policy Enforcer versions antérieures à 23.1R1 Hotpatch v3 | ||
| Juniper Networks | Junos Space | Junos Space Security Director versions antérieures à 24.1R4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-S5-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.2 antérieures à 23.2R2-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2 antérieures à 24.2R2-S1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 24.4 ant\u00e9rieures \u00e0 24.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-S8-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S4-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 22.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-S2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.4-EVO ant\u00e9rieures \u00e0 24.4R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R4",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 23.1R1 Hotpatch v3",
"product": {
"name": "Security Director",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space Security Director versions ant\u00e9rieures \u00e0 24.1R4",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-S5-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2 ant\u00e9rieures \u00e0 24.2R2-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2023-44431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44431"
},
{
"name": "CVE-2021-47606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47606"
},
{
"name": "CVE-2025-59993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59993"
},
{
"name": "CVE-2025-59997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59997"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2025-59995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59995"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-59986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59986"
},
{
"name": "CVE-2025-60009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60009"
},
{
"name": "CVE-2025-59989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59989"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2023-46103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46103"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2025-59999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59999"
},
{
"name": "CVE-2025-59994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59994"
},
{
"name": "CVE-2024-4076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4076"
},
{
"name": "CVE-2025-59967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59967"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-3390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47538"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2025-59991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59991"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2025-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26600"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2023-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
},
{
"name": "CVE-2025-59982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59982"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2018-17247",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17247"
},
{
"name": "CVE-2025-60004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60004"
},
{
"name": "CVE-2023-51594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51594"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2023-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50229"
},
{
"name": "CVE-2025-59974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59974"
},
{
"name": "CVE-2025-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26598"
},
{
"name": "CVE-2018-3824",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3824"
},
{
"name": "CVE-2024-40928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40928"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-59981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59981"
},
{
"name": "CVE-2023-31248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31248"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2021-4104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2023-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2025-59968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59968"
},
{
"name": "CVE-2023-51592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51592"
},
{
"name": "CVE-2025-59990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59990"
},
{
"name": "CVE-2021-22146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22146"
},
{
"name": "CVE-2025-59978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59978"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-27434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2025-59992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59992"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2025-60000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60000"
},
{
"name": "CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"name": "CVE-2024-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47607"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2023-45866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45866"
},
{
"name": "CVE-2023-27349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27349"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2015-5377",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5377"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-60001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60001"
},
{
"name": "CVE-2024-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5742"
},
{
"name": "CVE-2023-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50230"
},
{
"name": "CVE-2025-52960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52960"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-59996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59996"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2023-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38575"
},
{
"name": "CVE-2024-35911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35911"
},
{
"name": "CVE-2025-59957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59957"
},
{
"name": "CVE-2025-59958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59958"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2018-17244",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17244"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26597"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2024-42934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42934"
},
{
"name": "CVE-2023-51580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51580"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2023-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21102"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-59983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59983"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2025-60006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60006"
},
{
"name": "CVE-2024-36489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
},
{
"name": "CVE-2015-1427",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1427"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-9632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9632"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2025-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26595"
},
{
"name": "CVE-2024-26868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26868"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2024-8235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8235"
},
{
"name": "CVE-2023-4147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4147"
},
{
"name": "CVE-2025-59977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59977"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3610"
},
{
"name": "CVE-2025-26596",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26596"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-48622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48622"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2024-26828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26828"
},
{
"name": "CVE-2025-59998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59998"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2024-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30204"
},
{
"name": "CVE-2025-60002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60002"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2018-3831",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3831"
},
{
"name": "CVE-2023-43490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43490"
},
{
"name": "CVE-2025-59976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59976"
},
{
"name": "CVE-2025-59980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59980"
},
{
"name": "CVE-2025-26599",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26599"
},
{
"name": "CVE-2024-47615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47615"
},
{
"name": "CVE-2018-3823",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3823"
},
{
"name": "CVE-2023-22655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22655"
},
{
"name": "CVE-2024-6126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6126"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-39368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39368"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2025-59975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59975"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2025-59987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59987"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2018-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3826"
},
{
"name": "CVE-2025-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26601"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2025-59985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59985"
},
{
"name": "CVE-2025-11198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11198"
},
{
"name": "CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-26327",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26327"
},
{
"name": "CVE-2015-3253",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3253"
},
{
"name": "CVE-2025-59964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59964"
},
{
"name": "CVE-2025-59988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59988"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2023-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45733"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2024-6655",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6655"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-27049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27049"
},
{
"name": "CVE-2025-59984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59984"
},
{
"name": "CVE-2025-52961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52961"
},
{
"name": "CVE-2023-51589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51589"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3903"
},
{
"name": "CVE-2024-35800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35800"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2023-51596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51596"
},
{
"name": "CVE-2025-60010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60010"
},
{
"name": "CVE-2023-51764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51764"
},
{
"name": "CVE-2025-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26594"
},
{
"name": "CVE-2024-6409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6409"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"name": "CVE-2025-59962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59962"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"initial_release_date": "2025-10-09T00:00:00",
"last_revision_date": "2025-10-09T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0855",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103140",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-XSS-vulnerabilities-resolved-in-24-1R4-release"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103141",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R4-release"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103163",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-Multiple-OS-command-injection-vulnerabilities-fixed-CVE-2025-60006"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103168",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Device-allows-login-for-user-with-expired-password-CVE-2025-60010"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103171",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Reflected-client-side-HTTP-parameter-pollution-vulnerability-in-web-interface-CVE-2025-59977"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103167",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-When-a-user-with-the-name-ftp-or-anonymous-is-configured-unauthenticated-filesystem-access-is-allowed-CVE-2025-59980"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103156",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7024X-ACX7100-32C-ACX7100-48L-ACX7348-ACX7509-When-specific-valid-multicast-traffic-is-received-on-the-L3-interface-a-vulnerable-device-evo-pfemand-crashes-and-restarts-CVE-2025-59967"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103437",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Security-Director-Policy-Enforcer-An-unrestricted-API-allows-a-network-based-unauthenticated-attacker-to-deploy-malicious-vSRX-images-to-VMWare-NSX-Server-CVE-2025-11198"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103172",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Flooding-device-with-inbound-API-calls-leads-to-WebUI-and-CLI-management-access-DoS-CVE-2025-59975"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103157",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-sensitive-resources-in-web-interface-CVE-2025-59968"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103170",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Arbitrary-file-download-vulnerability-in-web-interface-CVE-2025-59976"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103139",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103151",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-BGP-sharding-enabled-change-in-indirect-next-hop-can-cause-RPD-crash-CVE-2025-59962"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103153",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX4700-When-forwarding-options-sampling-is-enabled-any-traffic-destined-to-the-RE-will-cause-the-forwarding-line-card-to-crash-and-restart-CVE-2025-59964"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103147",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-When-firewall-filter-rejects-traffic-these-packets-are-erroneously-sent-to-the-RE-CVE-2025-59958"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103144",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-except-PTX10003-An-unauthenticated-adjacent-attacker-sending-specific-valid-traffic-can-cause-a-memory-leak-in-cfmman-leading-to-FPC-crash-and-restart-CVE-2025-52961"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103143",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Receipt-of-specific-SIP-packets-in-a-high-utilization-situation-causes-a-flowd-crash-CVE-2025-52960"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103146",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-An-attacker-with-physical-access-can-open-a-persistent-backdoor-CVE-2025-59957"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103138",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4-by-upgrading-Log4j-Java-library-to-2-23-1-and-ElasticSearch-to-6-8-17"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103165",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-BGP-EVPN-update-message-causes-rpd-crash-CVE-2025-60004"
}
]
}
CERTFR-2024-AVI-0634
Vulnerability from certfr_avis - Published: 2024-07-30 - Updated: 2024-07-30
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Apple indique que la vulnérabilité CVE-2024-23296 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | macOS Monterey versions antérieures à 12.7.6 | ||
| Apple | N/A | iOS et iPadOS versions antérieures à 17.6 | ||
| Apple | N/A | macOS Ventura versions antérieures à 13.6.8 | ||
| Apple | N/A | visionOS versions antérieures à 1.3 | ||
| Apple | N/A | tvOS versions antérieures à 17.6 | ||
| Apple | N/A | iOS et iPadOS versions antérieures à 16.7.9 | ||
| Apple | N/A | watchOS versions antérieures à 10.6 | ||
| Apple | N/A | Safari versions antérieures à 17.6 | ||
| Apple | N/A | macOS Sonoma versions antérieures à 14.6 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.7.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.6.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 16.7.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 10.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2024-40824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40824"
},
{
"name": "CVE-2023-27952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27952"
},
{
"name": "CVE-2024-27823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27823"
},
{
"name": "CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"name": "CVE-2023-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38709"
},
{
"name": "CVE-2024-40794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40794"
},
{
"name": "CVE-2024-40813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40813"
},
{
"name": "CVE-2024-27316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27316"
},
{
"name": "CVE-2024-40793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40793"
},
{
"name": "CVE-2024-40781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40781"
},
{
"name": "CVE-2024-40818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40818"
},
{
"name": "CVE-2024-40816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40816"
},
{
"name": "CVE-2024-40804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40804"
},
{
"name": "CVE-2024-40817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40817"
},
{
"name": "CVE-2024-23296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23296"
},
{
"name": "CVE-2024-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
},
{
"name": "CVE-2024-40827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40827"
},
{
"name": "CVE-2024-27804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27804"
},
{
"name": "CVE-2024-40785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40785"
},
{
"name": "CVE-2024-40777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40777"
},
{
"name": "CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"name": "CVE-2024-40798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40798"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2024-27871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27871"
},
{
"name": "CVE-2024-40815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40815"
},
{
"name": "CVE-2024-27872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27872"
},
{
"name": "CVE-2024-23261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23261"
},
{
"name": "CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"name": "CVE-2024-40834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40834"
},
{
"name": "CVE-2024-40809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40809"
},
{
"name": "CVE-2024-27873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27873"
},
{
"name": "CVE-2024-27878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27878"
},
{
"name": "CVE-2024-40784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40784"
},
{
"name": "CVE-2024-40823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40823"
},
{
"name": "CVE-2024-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2379"
},
{
"name": "CVE-2024-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40812"
},
{
"name": "CVE-2024-40774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40774"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-40796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40796"
},
{
"name": "CVE-2024-40828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40828"
},
{
"name": "CVE-2024-27862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27862"
},
{
"name": "CVE-2024-27826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27826"
},
{
"name": "CVE-2024-40836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40836"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-27883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27883"
},
{
"name": "CVE-2024-40788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40788"
},
{
"name": "CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"name": "CVE-2024-40822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40822"
},
{
"name": "CVE-2024-27877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27877"
},
{
"name": "CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"name": "CVE-2024-27882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27882"
},
{
"name": "CVE-2024-40805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40805"
},
{
"name": "CVE-2024-40829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40829"
},
{
"name": "CVE-2024-40835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40835"
},
{
"name": "CVE-2024-40786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40786"
},
{
"name": "CVE-2024-40833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40833"
},
{
"name": "CVE-2024-40806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40806"
},
{
"name": "CVE-2024-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40778"
},
{
"name": "CVE-2024-40814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40814"
},
{
"name": "CVE-2024-40783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40783"
},
{
"name": "CVE-2024-40807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40807"
},
{
"name": "CVE-2024-40832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40832"
},
{
"name": "CVE-2024-27863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27863"
},
{
"name": "CVE-2024-40803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40803"
},
{
"name": "CVE-2024-40811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40811"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2024-40775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40775"
},
{
"name": "CVE-2024-27881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27881"
},
{
"name": "CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"name": "CVE-2024-40787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40787"
},
{
"name": "CVE-2024-40821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40821"
},
{
"name": "CVE-2024-40802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40802"
},
{
"name": "CVE-2024-40800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40800"
},
{
"name": "CVE-2024-40795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40795"
},
{
"name": "CVE-2024-40799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40799"
}
],
"initial_release_date": "2024-07-30T00:00:00",
"last_revision_date": "2024-07-30T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0634",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2024-23296 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214119",
"url": "https://support.apple.com/kb/HT214119"
},
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214117",
"url": "https://support.apple.com/kb/HT214117"
},
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214123",
"url": "https://support.apple.com/kb/HT214123"
},
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214120",
"url": "https://support.apple.com/kb/HT214120"
},
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214124",
"url": "https://support.apple.com/kb/HT214124"
},
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214118",
"url": "https://support.apple.com/kb/HT214118"
},
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214121",
"url": "https://support.apple.com/kb/HT214121"
},
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214116",
"url": "https://support.apple.com/kb/HT214116"
},
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214122",
"url": "https://support.apple.com/kb/HT214122"
}
]
}
CERTFR-2024-AVI-0475
Vulnerability from certfr_avis - Published: 2024-06-11 - Updated: 2024-06-11
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Security Center | Security Center versions antérieures à 6.4.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security Center versions ant\u00e9rieures \u00e0 6.4.0",
"product": {
"name": "Security Center",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2023-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38709"
},
{
"name": "CVE-2024-27316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27316"
},
{
"name": "CVE-2024-3096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3096"
},
{
"name": "CVE-2024-1874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1874"
},
{
"name": "CVE-2024-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1891"
},
{
"name": "CVE-2024-5759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5759"
}
],
"initial_release_date": "2024-06-11T00:00:00",
"last_revision_date": "2024-06-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0475",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Security Center. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Security Center",
"vendor_advisories": [
{
"published_at": "2024-07-02",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2024-10",
"url": "https://www.tenable.com/security/tns-2024-10"
}
]
}
CERTFR-2025-AVI-0158
Vulnerability from certfr_avis - Published: 2025-02-24 - Updated: 2025-02-24
De multiples vulnérabilités ont été découvertes dans les produits NetApp. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| NetApp | ONTAP tools pour VMware vSphere 10 | ONTAP tools for VMware vSphere 10 versions antérieures à 10.3 | ||
| NetApp | HCI Compute Node (Bootstrap OS) | HCI Compute Node (Bootstrap OS) versions antérieures à 12.8 | ||
| NetApp | SolidFire & HCI Storage Node (Element Software) | SolidFire & HCI Storage Node (Element Software) versions antérieures à 12.8 | ||
| NetApp | SolidFire & HCI Management Node | SolidFire & HCI Management Node versions antérieures à 12.8 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ONTAP tools for VMware vSphere 10 versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "ONTAP tools pour VMware vSphere 10",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "HCI Compute Node (Bootstrap OS) versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "HCI Compute Node (Bootstrap OS)",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "SolidFire \u0026 HCI Storage Node (Element Software) versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "SolidFire \u0026 HCI Storage Node (Element Software)",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "SolidFire \u0026 HCI Management Node versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "SolidFire \u0026 HCI Management Node",
"vendor": {
"name": "NetApp",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2023-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38709"
},
{
"name": "CVE-2024-51562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51562"
},
{
"name": "CVE-2024-27316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27316"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-0373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0373"
},
{
"name": "CVE-2024-51565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51565"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2020-16593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16593"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2024-51563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51563"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2024-51564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51564"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2025-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0374"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2025-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0662"
},
{
"name": "CVE-2024-51566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51566"
}
],
"initial_release_date": "2025-02-24T00:00:00",
"last_revision_date": "2025-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0158",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits NetApp. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits NetApp",
"vendor_advisories": [
{
"published_at": "2023-07-06",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20230706-0008",
"url": "https://security.netapp.com/advisory/ntap-20230706-0008/"
},
{
"published_at": "2021-01-22",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20210122-0003",
"url": "https://security.netapp.com/advisory/ntap-20210122-0003/"
},
{
"published_at": "2023-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20230316-0011",
"url": "https://security.netapp.com/advisory/ntap-20230316-0011/"
},
{
"published_at": "2021-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20211223-0002",
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
},
{
"published_at": "2024-04-15",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20240415-0013",
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
}
]
}
GSD-2024-24795
Vulnerability from gsd - Updated: 2024-02-01 06:02{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-24795"
],
"details": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"id": "GSD-2024-24795",
"modified": "2024-02-01T06:02:24.443207Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2024-24795",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.4.0",
"version_value": "2.4.58"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Keran Mu, Tsinghua University and Zhongguancun Laboratory."
},
{
"lang": "en",
"value": "Jianjun Chen, Tsinghua University and Zhongguancun Laboratory."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "HTTP response splitting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "MISC",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20240415-0013/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
},
{
"lang": "es",
"value": "La divisi\u00f3n de la respuesta HTTP en varios m\u00f3dulos en el servidor HTTP Apache permite que un atacante pueda inyectar encabezados de respuesta maliciosos en aplicaciones backend para provocar un ataque de desincronizaci\u00f3n HTTP. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.59, que soluciona este problema."
}
],
"id": "CVE-2024-24795",
"lastModified": "2024-04-19T23:15:09.567",
"metrics": {},
"published": "2024-04-04T20:15:08.663",
"references": [
{
"source": "security@apache.org",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"source": "security@apache.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/"
},
{
"source": "security@apache.org",
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Awaiting Analysis"
}
}
}
}
WID-SEC-W-2024-0801
Vulnerability from csaf_certbund - Published: 2024-04-04 22:00 - Updated: 2025-12-28 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0801 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0801.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0801 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0801"
},
{
"category": "external",
"summary": "Apache 2.4.59 Changes vom 2024-04-04",
"url": "https://downloads.apache.org/httpd/CHANGES_2.4.59"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7147925 vom 2024-04-10",
"url": "https://www.ibm.com/support/pages/node/7147925"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6729-1 vom 2024-04-11",
"url": "https://ubuntu.com/security/notices/USN-6729-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5662 vom 2024-04-16",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00070.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7148492 vom 2024-04-17",
"url": "https://www.ibm.com/support/pages/node/7148492"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C2F6576348 vom 2024-04-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c2f6576348"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-937BE154D8 vom 2024-04-17",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-937be154d8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6729-2 vom 2024-04-17",
"url": "https://ubuntu.com/security/notices/USN-6729-2"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-D0DCCD6B96 vom 2024-04-17",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d0dccd6b96"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7148975 vom 2024-04-22",
"url": "https://www.ibm.com/support/pages/node/7148975"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6729-3 vom 2024-04-29",
"url": "https://ubuntu.com/security/notices/USN-6729-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1627-1 vom 2024-05-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018514.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3818 vom 2024-05-25",
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K000139764 vom 2024-05-24",
"url": "https://my.f5.com/manage/s/article/K000139764"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3819 vom 2024-05-25",
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1788-1 vom 2024-05-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1963-1 vom 2024-06-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018665.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7158641 vom 2024-06-25",
"url": "https://www.ibm.com/support/pages/node/7158641"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7159010 vom 2024-06-27",
"url": "https://www.ibm.com/support/pages/node/7159010"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2532 vom 2024-06-28",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2532.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4197 vom 2024-07-01",
"url": "https://access.redhat.com/errata/RHSA-2024:4197"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4197 vom 2024-07-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-4197.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1868-1 vom 2024-07-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019070.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
"url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "DELL Security Update for Dell PowerScale OneFS",
"url": "https://www.dell.com/support/kbdoc/en-us/000228207/dsa-2024-346-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6928 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6928"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6927 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6927"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202409-31 vom 2024-09-28",
"url": "https://security.gentoo.org/glsa/202409-31"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-423 vom 2024-10-11",
"url": "https://www.dell.com/support/kbdoc/de-de/000235068/dsa-2024-423-security-update-for-dell-networker-and-networker-management-console-nmc-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173018 vom 2024-10-14",
"url": "https://www.ibm.com/support/pages/node/7173018"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3853-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GDIAJ27VL2K243BWSBUC7E6Y4HBYRCG7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3861-1 vom 2024-11-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZWV2MVSBRL4AIHT5O6LIOEUFMOC3TUBS/"
},
{
"category": "external",
"summary": "HCL Security Advisory",
"url": "https://support.hcl-software.com/csm?id=kb_article\u0026sysparm_article=KB0115052"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9306 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9306"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7178934 vom 2024-12-14",
"url": "https://www.ibm.com/support/pages/node/7178934"
},
{
"category": "external",
"summary": "HPE Security Bulletin vom 2025-01-17",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04773en_us\u0026docLocale=en_US"
},
{
"category": "external",
"summary": "F5 Security Advisory K000139447 vom 2025-01-18",
"url": "https://my.f5.com/manage/s/article/K000139447"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7239846 vom 2025-07-16",
"url": "https://www.ibm.com/support/pages/node/7239846"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2958 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2958.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7241583 vom 2025-08-06",
"url": "https://www.ibm.com/support/pages/node/7241583"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15023 vom 2025-09-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-15023.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7247015 vom 2025-10-03",
"url": "https://www.ibm.com/support/pages/node/7247015"
},
{
"category": "external",
"summary": "Dell Security Advisory",
"url": "https://www.dell.com/support/kbdoc/en-us/000390206/dsa-2025-381-security-update-for-dell-powerscale-onefs-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-415 vom 2025-12-22",
"url": "https://www.dell.com/support/kbdoc/000405813"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23732 vom 2025-12-26",
"url": "http://linux.oracle.com/errata/ELSA-2025-23732.html"
}
],
"source_lang": "en-US",
"title": "Apache HTTP Server: Mehrere Schwachstellen erm\u00f6glichen Manipulation von Daten",
"tracking": {
"current_release_date": "2025-12-28T23:00:00.000+00:00",
"generator": {
"date": "2025-12-29T09:05:30.719+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-0801",
"initial_release_date": "2024-04-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-04-08T22:00:00.000+00:00",
"number": "2",
"summary": "Bewertung angepasst"
},
{
"date": "2024-04-10T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-04-11T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-04-16T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-04-17T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von IBM, Fedora und Ubuntu aufgenommen"
},
{
"date": "2024-04-21T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-13T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-26T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Debian und F5 aufgenommen"
},
{
"date": "2024-05-27T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-10T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-24T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-06-27T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-06-30T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-09-01T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-09-24T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-10-13T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-03T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-21T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von HP und F5 aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "30",
"summary": "Referenz(en) aufgenommen: EUVD-2024-54775"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-08-06T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-12-21T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "38"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.4.59",
"product": {
"name": "Apache HTTP Server \u003c2.4.59",
"product_id": "T033904"
}
},
{
"category": "product_version",
"name": "2.4.59",
"product": {
"name": "Apache HTTP Server 2.4.59",
"product_id": "T033904-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:apache:http_server:2.4.59"
}
}
}
],
"category": "product_name",
"name": "HTTP Server"
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.10.0.5",
"product": {
"name": "Dell NetWorker \u003c19.10.0.5",
"product_id": "T038270"
}
},
{
"category": "product_version",
"name": "19.10.0.5",
"product": {
"name": "Dell NetWorker 19.10.0.5",
"product_id": "T038270-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.10.0.5"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerScale OneFS",
"product": {
"name": "Dell PowerScale OneFS",
"product_id": "T034610",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerscale_onefs:onefs"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Avamar",
"product": {
"name": "EMC Avamar",
"product_id": "T014381",
"product_identification_helper": {
"cpe": "cpe:/a:emc:avamar:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "17.1.0-17.1.1",
"product": {
"name": "F5 BIG-IP 17.1.0-17.1.1",
"product_id": "T034899",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:17.1.0_-_17.1.1"
}
}
},
{
"category": "product_version",
"name": "16.1.0-16.1.4",
"product": {
"name": "F5 BIG-IP 16.1.0-16.1.4",
"product_id": "T034901",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:16.1.0_-_16.1.4"
}
}
},
{
"category": "product_version",
"name": "15.1.0-15.1.10",
"product": {
"name": "F5 BIG-IP 15.1.0-15.1.10",
"product_id": "T034902",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:15.1.0_-_15.1.10"
}
}
},
{
"category": "product_version",
"name": "16.1.0-16.1.5",
"product": {
"name": "F5 BIG-IP 16.1.0-16.1.5",
"product_id": "T037028",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:16.1.0_-_16.1.5"
}
}
},
{
"category": "product_version",
"name": "17.1.0-17.1.2",
"product": {
"name": "F5 BIG-IP 17.1.0-17.1.2",
"product_id": "T040213",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:17.1.0_-_17.1.2"
}
}
}
],
"category": "product_name",
"name": "BIG-IP"
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "8.x",
"product": {
"name": "HCL Commerce 8.x",
"product_id": "T038745",
"product_identification_helper": {
"cpe": "cpe:/a:hcltechsw:commerce:8.x"
}
}
},
{
"category": "product_version",
"name": "9.0-9.0.1.21",
"product": {
"name": "HCL Commerce 9.0-9.0.1.21",
"product_id": "T038746",
"product_identification_helper": {
"cpe": "cpe:/a:hcltechsw:commerce:9.0_-_9.0.1.21"
}
}
},
{
"category": "product_version",
"name": "9.1.0-9.1.15",
"product": {
"name": "HCL Commerce 9.1.0-9.1.15",
"product_id": "T038747",
"product_identification_helper": {
"cpe": "cpe:/a:hcltechsw:commerce:9.1.0_-_9.1.15"
}
}
}
],
"category": "product_name",
"name": "Commerce"
}
],
"category": "vendor",
"name": "HCL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c11.31",
"product": {
"name": "HPE HP-UX \u003c11.31",
"product_id": "T040402"
}
},
{
"category": "product_version",
"name": "11.31",
"product": {
"name": "HPE HP-UX 11.31",
"product_id": "T040402-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:11.31"
}
}
}
],
"category": "product_name",
"name": "HP-UX"
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM Business Automation Workflow",
"product": {
"name": "IBM Business Automation Workflow",
"product_id": "T019704",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "8.5",
"product": {
"name": "IBM HTTP Server 8.5",
"product_id": "T003676",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:http_server:8.5"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "IBM HTTP Server 9.0",
"product_id": "T008162",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:http_server:9.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.5.25",
"product": {
"name": "IBM HTTP Server \u003c9.0.5.25",
"product_id": "T045476"
}
},
{
"category": "product_version",
"name": "9.0.5.25",
"product": {
"name": "IBM HTTP Server 9.0.5.25",
"product_id": "T045476-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:http_server:9.0.5.25"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.5.5.29",
"product": {
"name": "IBM HTTP Server \u003c8.5.5.29",
"product_id": "T045477"
}
},
{
"category": "product_version",
"name": "8.5.5.29",
"product": {
"name": "IBM HTTP Server 8.5.5.29",
"product_id": "T045477-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:http_server:8.5.5.29"
}
}
}
],
"category": "product_name",
"name": "HTTP Server"
},
{
"branches": [
{
"category": "product_version",
"name": "V10",
"product": {
"name": "IBM Power Hardware Management Console V10",
"product_id": "T023373",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:v10"
}
}
}
],
"category": "product_name",
"name": "Power Hardware Management Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.0.27",
"product": {
"name": "IBM Rational Build Forge \u003c8.0.0.27",
"product_id": "T038286"
}
},
{
"category": "product_version",
"name": "8.0.0.27",
"product": {
"name": "IBM Rational Build Forge 8.0.0.27",
"product_id": "T038286-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.27"
}
}
}
],
"category": "product_name",
"name": "Rational Build Forge"
},
{
"category": "product_name",
"name": "IBM Rational ClearCase",
"product": {
"name": "IBM Rational ClearCase",
"product_id": "T004180",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearcase:-"
}
}
},
{
"category": "product_name",
"name": "IBM Rational ClearQuest",
"product": {
"name": "IBM Rational ClearQuest",
"product_id": "5168",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearquest:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "6.3.0.7",
"product": {
"name": "IBM Tivoli Monitoring 6.3.0.7",
"product_id": "342008",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.3.0.7 SP 5",
"product": {
"name": "IBM Tivoli Monitoring \u003c6.3.0.7 SP 5",
"product_id": "T047377"
}
},
{
"category": "product_version",
"name": "6.3.0.7 SP 5",
"product": {
"name": "IBM Tivoli Monitoring 6.3.0.7 SP 5",
"product_id": "T047377-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7_sp_5"
}
}
}
],
"category": "product_name",
"name": "Tivoli Monitoring"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38709",
"product_status": {
"known_affected": [
"T038747",
"67646",
"T034902",
"T038746",
"5168",
"T034901",
"T038745",
"T004914",
"T038286",
"T024663",
"398363",
"T040213",
"T033904",
"342008",
"T023373",
"T034899",
"T034610",
"T003676",
"T015632",
"T037028",
"T012167",
"74185",
"T045852",
"T014381",
"2951",
"T002207",
"T000126",
"T019704",
"T038270",
"T004180",
"T040402",
"T008162",
"T045477",
"T047377",
"T045476"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2024-24795",
"product_status": {
"known_affected": [
"T038747",
"67646",
"T034902",
"T038746",
"5168",
"T034901",
"T038745",
"T004914",
"T038286",
"T024663",
"398363",
"T040213",
"T033904",
"342008",
"T023373",
"T034899",
"T034610",
"T003676",
"T015632",
"T037028",
"T012167",
"74185",
"T045852",
"T014381",
"2951",
"T002207",
"T000126",
"T019704",
"T038270",
"T004180",
"T040402",
"T008162",
"T045477",
"T047377",
"T045476"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2024-24795"
}
]
}
WID-SEC-W-2024-1248
Vulnerability from csaf_certbund - Published: 2024-05-28 22:00 - Updated: 2024-11-21 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1248 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1248.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1248 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1248"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX24-010 vom 2024-05-28",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/05/Xerox-Security-Bulletin-XRX24-010-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2688 vom 2024-11-01",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2688.html"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
}
],
"source_lang": "en-US",
"title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-21T23:00:00.000+00:00",
"generator": {
"date": "2024-11-22T10:06:51.860+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1248",
"initial_release_date": "2024-05-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-11-21T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
},
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-10401",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2014-10401"
},
{
"cve": "CVE-2014-10402",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2014-10402"
},
{
"cve": "CVE-2020-22218",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2020-22218"
},
{
"cve": "CVE-2020-27545",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2020-27545"
},
{
"cve": "CVE-2020-28162",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2020-28162"
},
{
"cve": "CVE-2020-28163",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2020-28163"
},
{
"cve": "CVE-2022-22817",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2022-22817"
},
{
"cve": "CVE-2022-32200",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2022-32200"
},
{
"cve": "CVE-2022-34299",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2022-34299"
},
{
"cve": "CVE-2022-39170",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2022-39170"
},
{
"cve": "CVE-2022-40982",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2022-40982"
},
{
"cve": "CVE-2022-46285",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2022-46285"
},
{
"cve": "CVE-2022-46344",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2022-46344"
},
{
"cve": "CVE-2023-22053",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-22053"
},
{
"cve": "CVE-2023-27371",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-27371"
},
{
"cve": "CVE-2023-34872",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-34872"
},
{
"cve": "CVE-2023-38408",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-38709",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-39326",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-39326"
},
{
"cve": "CVE-2023-39615",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-39615"
},
{
"cve": "CVE-2023-40305",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-40305"
},
{
"cve": "CVE-2023-40745",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-40745"
},
{
"cve": "CVE-2023-41175",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-41175"
},
{
"cve": "CVE-2023-43785",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-43785"
},
{
"cve": "CVE-2023-43786",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-43786"
},
{
"cve": "CVE-2023-43787",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-43787"
},
{
"cve": "CVE-2023-43788",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-43788"
},
{
"cve": "CVE-2023-43789",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-43789"
},
{
"cve": "CVE-2023-4408",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45285",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-45285"
},
{
"cve": "CVE-2023-46589",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-46589"
},
{
"cve": "CVE-2023-46728",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-46728"
},
{
"cve": "CVE-2023-4675",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-4675"
},
{
"cve": "CVE-2023-46751",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-46751"
},
{
"cve": "CVE-2023-46809",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-46809"
},
{
"cve": "CVE-2023-46846",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-46846"
},
{
"cve": "CVE-2023-46847",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-46847"
},
{
"cve": "CVE-2023-46848",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-46848"
},
{
"cve": "CVE-2023-47038",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-47038"
},
{
"cve": "CVE-2023-47100",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-47100"
},
{
"cve": "CVE-2023-48795",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49285",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-49285"
},
{
"cve": "CVE-2023-49286",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-49286"
},
{
"cve": "CVE-2023-49288",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-49288"
},
{
"cve": "CVE-2023-49990",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-49990"
},
{
"cve": "CVE-2023-49991",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-49991"
},
{
"cve": "CVE-2023-49992",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-49992"
},
{
"cve": "CVE-2023-49993",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-49993"
},
{
"cve": "CVE-2023-49994",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-49994"
},
{
"cve": "CVE-2023-50387",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-50387"
},
{
"cve": "CVE-2023-50447",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-50447"
},
{
"cve": "CVE-2023-50761",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-50761"
},
{
"cve": "CVE-2023-50762",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-50762"
},
{
"cve": "CVE-2023-50868",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-51384",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-51713",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-51713"
},
{
"cve": "CVE-2023-51765",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-51765"
},
{
"cve": "CVE-2023-52355",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-52355"
},
{
"cve": "CVE-2023-52356",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-52356"
},
{
"cve": "CVE-2023-5363",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5367",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5367"
},
{
"cve": "CVE-2023-5371",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5371"
},
{
"cve": "CVE-2023-5380",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5380"
},
{
"cve": "CVE-2023-5388",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5388"
},
{
"cve": "CVE-2023-5517",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5517"
},
{
"cve": "CVE-2023-5574",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5574"
},
{
"cve": "CVE-2023-5679",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5679"
},
{
"cve": "CVE-2023-5764",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5764"
},
{
"cve": "CVE-2023-5824",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-5824"
},
{
"cve": "CVE-2023-6174",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6174"
},
{
"cve": "CVE-2023-6175",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6175"
},
{
"cve": "CVE-2023-6377",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6377"
},
{
"cve": "CVE-2023-6478",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6478"
},
{
"cve": "CVE-2023-6516",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6516"
},
{
"cve": "CVE-2023-6856",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6856"
},
{
"cve": "CVE-2023-6857",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6857"
},
{
"cve": "CVE-2023-6858",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6858"
},
{
"cve": "CVE-2023-6859",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6859"
},
{
"cve": "CVE-2023-6860",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6860"
},
{
"cve": "CVE-2023-6861",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6861"
},
{
"cve": "CVE-2023-6862",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6862"
},
{
"cve": "CVE-2023-6863",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6863"
},
{
"cve": "CVE-2023-6864",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6864"
},
{
"cve": "CVE-2023-6865",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6865"
},
{
"cve": "CVE-2023-6867",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2023-6867"
},
{
"cve": "CVE-2024-0207",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0207"
},
{
"cve": "CVE-2024-0208",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0208"
},
{
"cve": "CVE-2024-0209",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0209"
},
{
"cve": "CVE-2024-0210",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0210"
},
{
"cve": "CVE-2024-0211",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0211"
},
{
"cve": "CVE-2024-0727",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-0741",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0741"
},
{
"cve": "CVE-2024-0742",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0742"
},
{
"cve": "CVE-2024-0743",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0743"
},
{
"cve": "CVE-2024-0746",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0746"
},
{
"cve": "CVE-2024-0747",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0747"
},
{
"cve": "CVE-2024-0749",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0749"
},
{
"cve": "CVE-2024-0750",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0750"
},
{
"cve": "CVE-2024-0751",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0751"
},
{
"cve": "CVE-2024-0753",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0753"
},
{
"cve": "CVE-2024-0755",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-0755"
},
{
"cve": "CVE-2024-1546",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-1546"
},
{
"cve": "CVE-2024-1547",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-1547"
},
{
"cve": "CVE-2024-1548",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-1548"
},
{
"cve": "CVE-2024-1549",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-1549"
},
{
"cve": "CVE-2024-1550",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-1550"
},
{
"cve": "CVE-2024-1551",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-1551"
},
{
"cve": "CVE-2024-1552",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-1552"
},
{
"cve": "CVE-2024-1553",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-1553"
},
{
"cve": "CVE-2024-20999",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-20999"
},
{
"cve": "CVE-2024-21011",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21011"
},
{
"cve": "CVE-2024-21059",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21059"
},
{
"cve": "CVE-2024-21068",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21068"
},
{
"cve": "CVE-2024-21085",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21085"
},
{
"cve": "CVE-2024-21094",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21094"
},
{
"cve": "CVE-2024-21105",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21105"
},
{
"cve": "CVE-2024-21890",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21890"
},
{
"cve": "CVE-2024-21891",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21891"
},
{
"cve": "CVE-2024-21896",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-21896"
},
{
"cve": "CVE-2024-22019",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-22019"
},
{
"cve": "CVE-2024-22195",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-24680",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-24680"
},
{
"cve": "CVE-2024-24795",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-24806",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-24806"
},
{
"cve": "CVE-2024-25617",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-25617"
},
{
"cve": "CVE-2024-2605",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-2605"
},
{
"cve": "CVE-2024-2607",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-2607"
},
{
"cve": "CVE-2024-2608",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-2608"
},
{
"cve": "CVE-2024-2610",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-2610"
},
{
"cve": "CVE-2024-2611",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-2611"
},
{
"cve": "CVE-2024-2612",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-2612"
},
{
"cve": "CVE-2024-2614",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-2614"
},
{
"cve": "CVE-2024-2616",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-2616"
},
{
"cve": "CVE-2024-27316",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Schwachstellen in unter anderem OpenJDK, Apache und Mozilla Firefox. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"398363",
"T015632",
"T035098"
]
},
"release_date": "2024-05-28T22:00:00.000+00:00",
"title": "CVE-2024-27316"
}
]
}
WID-SEC-W-2024-1725
Vulnerability from csaf_certbund - Published: 2024-07-29 22:00 - Updated: 2025-03-27 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code mit Administratorrechten auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, Daten zu modifizieren, den Benutzer zu t\u00e4uschen, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1725 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1725.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1725 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1725"
},
{
"category": "external",
"summary": "Apple security Update vom 2024-07-29",
"url": "https://support.apple.com/en-us/HT214118"
},
{
"category": "external",
"summary": "Apple security Update vom 2024-07-29",
"url": "https://support.apple.com/en-us/HT214119"
},
{
"category": "external",
"summary": "Apple security Update vom 2024-07-29",
"url": "https://support.apple.com/en-eg/HT214120"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-03-27T23:00:00.000+00:00",
"generator": {
"date": "2025-03-28T09:20:40.897+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-1725",
"initial_release_date": "2024-07-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "2",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "3",
"summary": "CVE aufgenommen"
},
{
"date": "2025-03-23T23:00:00.000+00:00",
"number": "4",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2025-03-24T23:00:00.000+00:00",
"number": "5",
"summary": "CVE-2024-54551, CVE-2024-54564 erg\u00e4nzt"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "6",
"summary": "CVE-2024-40810, CVE-2024-44305 erg\u00e4nzt"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Monterey \u003c12.7.6",
"product": {
"name": "Apple macOS Monterey \u003c12.7.6",
"product_id": "T036491"
}
},
{
"category": "product_version",
"name": "Monterey 12.7.6",
"product": {
"name": "Apple macOS Monterey 12.7.6",
"product_id": "T036491-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:monterey__12.7.6"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14.6",
"product": {
"name": "Apple macOS Sonoma \u003c14.6",
"product_id": "T036492"
}
},
{
"category": "product_version",
"name": "Sonoma 14.6",
"product": {
"name": "Apple macOS Sonoma 14.6",
"product_id": "T036492-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.6"
}
}
},
{
"category": "product_version_range",
"name": "Ventura \u003c13.6.8",
"product": {
"name": "Apple macOS Ventura \u003c13.6.8",
"product_id": "T036493"
}
},
{
"category": "product_version",
"name": "Ventura 13.6.8",
"product": {
"name": "Apple macOS Ventura 13.6.8",
"product_id": "T036493-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura__13.6.8"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-27952",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2023-27952"
},
{
"cve": "CVE-2023-38709",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-52356",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2023-52356"
},
{
"cve": "CVE-2023-6277",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2023-6277"
},
{
"cve": "CVE-2024-2004",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-23261",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-23261"
},
{
"cve": "CVE-2024-23296",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-23296"
},
{
"cve": "CVE-2024-2379",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-2379"
},
{
"cve": "CVE-2024-2398",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-2466",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-24795",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-27316",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-27826",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27826"
},
{
"cve": "CVE-2024-27862",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27862"
},
{
"cve": "CVE-2024-27863",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27863"
},
{
"cve": "CVE-2024-27871",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27871"
},
{
"cve": "CVE-2024-27872",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27872"
},
{
"cve": "CVE-2024-27873",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27873"
},
{
"cve": "CVE-2024-27877",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27877"
},
{
"cve": "CVE-2024-27878",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27878"
},
{
"cve": "CVE-2024-27881",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27881"
},
{
"cve": "CVE-2024-27882",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27882"
},
{
"cve": "CVE-2024-27883",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-27883"
},
{
"cve": "CVE-2024-40774",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40774"
},
{
"cve": "CVE-2024-40775",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40775"
},
{
"cve": "CVE-2024-40776",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40776"
},
{
"cve": "CVE-2024-40777",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40777"
},
{
"cve": "CVE-2024-40778",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40778"
},
{
"cve": "CVE-2024-40779",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40779"
},
{
"cve": "CVE-2024-40780",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40780"
},
{
"cve": "CVE-2024-40781",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40781"
},
{
"cve": "CVE-2024-40782",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40782"
},
{
"cve": "CVE-2024-40783",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40783"
},
{
"cve": "CVE-2024-40784",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40784"
},
{
"cve": "CVE-2024-40785",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40785"
},
{
"cve": "CVE-2024-40786",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40786"
},
{
"cve": "CVE-2024-40787",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40787"
},
{
"cve": "CVE-2024-40788",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40788"
},
{
"cve": "CVE-2024-40789",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40789"
},
{
"cve": "CVE-2024-40793",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40793"
},
{
"cve": "CVE-2024-40794",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40794"
},
{
"cve": "CVE-2024-40795",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40795"
},
{
"cve": "CVE-2024-40796",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40796"
},
{
"cve": "CVE-2024-40798",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40798"
},
{
"cve": "CVE-2024-40799",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40799"
},
{
"cve": "CVE-2024-40800",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40800"
},
{
"cve": "CVE-2024-40802",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40802"
},
{
"cve": "CVE-2024-40803",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40803"
},
{
"cve": "CVE-2024-40804",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40804"
},
{
"cve": "CVE-2024-40805",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40805"
},
{
"cve": "CVE-2024-40806",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40806"
},
{
"cve": "CVE-2024-40807",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40807"
},
{
"cve": "CVE-2024-40809",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40809"
},
{
"cve": "CVE-2024-40810",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40810"
},
{
"cve": "CVE-2024-40811",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40811"
},
{
"cve": "CVE-2024-40812",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40812"
},
{
"cve": "CVE-2024-40814",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40814"
},
{
"cve": "CVE-2024-40815",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40815"
},
{
"cve": "CVE-2024-40816",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40816"
},
{
"cve": "CVE-2024-40817",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40817"
},
{
"cve": "CVE-2024-40818",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40818"
},
{
"cve": "CVE-2024-40821",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40821"
},
{
"cve": "CVE-2024-40822",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40822"
},
{
"cve": "CVE-2024-40823",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40823"
},
{
"cve": "CVE-2024-40824",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40824"
},
{
"cve": "CVE-2024-40827",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40827"
},
{
"cve": "CVE-2024-40828",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40828"
},
{
"cve": "CVE-2024-40829",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40829"
},
{
"cve": "CVE-2024-40832",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40832"
},
{
"cve": "CVE-2024-40833",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40833"
},
{
"cve": "CVE-2024-40834",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40834"
},
{
"cve": "CVE-2024-40835",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40835"
},
{
"cve": "CVE-2024-40836",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-40836"
},
{
"cve": "CVE-2024-44141",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-44141"
},
{
"cve": "CVE-2024-44185",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-44185"
},
{
"cve": "CVE-2024-44199",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-44199"
},
{
"cve": "CVE-2024-44205",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-44205"
},
{
"cve": "CVE-2024-44206",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-44206"
},
{
"cve": "CVE-2024-44305",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-44305"
},
{
"cve": "CVE-2024-44306",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-44306"
},
{
"cve": "CVE-2024-44307",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-44307"
},
{
"cve": "CVE-2024-4558",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-4558"
},
{
"cve": "CVE-2024-54551",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-54551"
},
{
"cve": "CVE-2024-54564",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-54564"
},
{
"cve": "CVE-2024-6387",
"product_status": {
"known_affected": [
"T036491",
"T036492",
"T036493"
]
},
"release_date": "2024-07-29T22:00:00.000+00:00",
"title": "CVE-2024-6387"
}
]
}
OPENSUSE-SU-2024:14463-1
Vulnerability from csaf_opensuse - Published: 2024-11-05 00:00 - Updated: 2024-11-05 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "apache2-mod_uwsgi-2.0.28-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the apache2-mod_uwsgi-2.0.28-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14463",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14463-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24795 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24795/"
}
],
"title": "apache2-mod_uwsgi-2.0.28-1.1 on GA media",
"tracking": {
"current_release_date": "2024-11-05T00:00:00Z",
"generator": {
"date": "2024-11-05T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14463-1",
"initial_release_date": "2024-11-05T00:00:00Z",
"revision_history": [
{
"date": "2024-11-05T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.28-1.1.aarch64",
"product": {
"name": "apache2-mod_uwsgi-2.0.28-1.1.aarch64",
"product_id": "apache2-mod_uwsgi-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-uwsgi-python3-2.0.28-1.1.aarch64",
"product": {
"name": "python310-uwsgi-python3-2.0.28-1.1.aarch64",
"product_id": "python310-uwsgi-python3-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-uwsgi-python3-2.0.28-1.1.aarch64",
"product": {
"name": "python311-uwsgi-python3-2.0.28-1.1.aarch64",
"product_id": "python311-uwsgi-python3-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-uwsgi-python3-2.0.28-1.1.aarch64",
"product": {
"name": "python312-uwsgi-python3-2.0.28-1.1.aarch64",
"product_id": "python312-uwsgi-python3-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-2.0.28-1.1.aarch64",
"product_id": "uwsgi-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-emperor_pg-2.0.28-1.1.aarch64",
"product_id": "uwsgi-emperor_pg-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.aarch64",
"product_id": "uwsgi-emperor_zeromq-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-gevent-2.0.28-1.1.aarch64",
"product_id": "uwsgi-gevent-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-glusterfs-2.0.28-1.1.aarch64",
"product_id": "uwsgi-glusterfs-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-greenlet-2.0.28-1.1.aarch64",
"product_id": "uwsgi-greenlet-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-jvm-2.0.28-1.1.aarch64",
"product_id": "uwsgi-jvm-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-ldap-2.0.28-1.1.aarch64",
"product_id": "uwsgi-ldap-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-libffi-2.0.28-1.1.aarch64",
"product_id": "uwsgi-libffi-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-logzmq-2.0.28-1.1.aarch64",
"product_id": "uwsgi-logzmq-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-lua-2.0.28-1.1.aarch64",
"product_id": "uwsgi-lua-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-pam-2.0.28-1.1.aarch64",
"product_id": "uwsgi-pam-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-php8-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-php8-2.0.28-1.1.aarch64",
"product_id": "uwsgi-php8-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-psgi-2.0.28-1.1.aarch64",
"product_id": "uwsgi-psgi-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-pypy-2.0.28-1.1.aarch64",
"product_id": "uwsgi-pypy-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-sqlite3-2.0.28-1.1.aarch64",
"product_id": "uwsgi-sqlite3-2.0.28-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.28-1.1.aarch64",
"product": {
"name": "uwsgi-xslt-2.0.28-1.1.aarch64",
"product_id": "uwsgi-xslt-2.0.28-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.28-1.1.ppc64le",
"product": {
"name": "apache2-mod_uwsgi-2.0.28-1.1.ppc64le",
"product_id": "apache2-mod_uwsgi-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-uwsgi-python3-2.0.28-1.1.ppc64le",
"product": {
"name": "python310-uwsgi-python3-2.0.28-1.1.ppc64le",
"product_id": "python310-uwsgi-python3-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-uwsgi-python3-2.0.28-1.1.ppc64le",
"product": {
"name": "python311-uwsgi-python3-2.0.28-1.1.ppc64le",
"product_id": "python311-uwsgi-python3-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-uwsgi-python3-2.0.28-1.1.ppc64le",
"product": {
"name": "python312-uwsgi-python3-2.0.28-1.1.ppc64le",
"product_id": "python312-uwsgi-python3-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-emperor_pg-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-emperor_pg-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-gevent-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-gevent-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-glusterfs-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-glusterfs-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-greenlet-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-greenlet-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-jvm-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-jvm-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-ldap-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-ldap-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-libffi-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-libffi-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-logzmq-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-logzmq-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-lua-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-lua-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-pam-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-pam-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-php8-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-php8-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-php8-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-psgi-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-psgi-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-pypy-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-pypy-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-sqlite3-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-sqlite3-2.0.28-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.28-1.1.ppc64le",
"product": {
"name": "uwsgi-xslt-2.0.28-1.1.ppc64le",
"product_id": "uwsgi-xslt-2.0.28-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.28-1.1.s390x",
"product": {
"name": "apache2-mod_uwsgi-2.0.28-1.1.s390x",
"product_id": "apache2-mod_uwsgi-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-uwsgi-python3-2.0.28-1.1.s390x",
"product": {
"name": "python310-uwsgi-python3-2.0.28-1.1.s390x",
"product_id": "python310-uwsgi-python3-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-uwsgi-python3-2.0.28-1.1.s390x",
"product": {
"name": "python311-uwsgi-python3-2.0.28-1.1.s390x",
"product_id": "python311-uwsgi-python3-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-uwsgi-python3-2.0.28-1.1.s390x",
"product": {
"name": "python312-uwsgi-python3-2.0.28-1.1.s390x",
"product_id": "python312-uwsgi-python3-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-2.0.28-1.1.s390x",
"product_id": "uwsgi-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-emperor_pg-2.0.28-1.1.s390x",
"product_id": "uwsgi-emperor_pg-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.s390x",
"product_id": "uwsgi-emperor_zeromq-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-gevent-2.0.28-1.1.s390x",
"product_id": "uwsgi-gevent-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-glusterfs-2.0.28-1.1.s390x",
"product_id": "uwsgi-glusterfs-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-greenlet-2.0.28-1.1.s390x",
"product_id": "uwsgi-greenlet-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-jvm-2.0.28-1.1.s390x",
"product_id": "uwsgi-jvm-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-ldap-2.0.28-1.1.s390x",
"product_id": "uwsgi-ldap-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-libffi-2.0.28-1.1.s390x",
"product_id": "uwsgi-libffi-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-logzmq-2.0.28-1.1.s390x",
"product_id": "uwsgi-logzmq-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-lua-2.0.28-1.1.s390x",
"product_id": "uwsgi-lua-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-pam-2.0.28-1.1.s390x",
"product_id": "uwsgi-pam-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-php8-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-php8-2.0.28-1.1.s390x",
"product_id": "uwsgi-php8-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-psgi-2.0.28-1.1.s390x",
"product_id": "uwsgi-psgi-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-pypy-2.0.28-1.1.s390x",
"product_id": "uwsgi-pypy-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-sqlite3-2.0.28-1.1.s390x",
"product_id": "uwsgi-sqlite3-2.0.28-1.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.28-1.1.s390x",
"product": {
"name": "uwsgi-xslt-2.0.28-1.1.s390x",
"product_id": "uwsgi-xslt-2.0.28-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.28-1.1.x86_64",
"product": {
"name": "apache2-mod_uwsgi-2.0.28-1.1.x86_64",
"product_id": "apache2-mod_uwsgi-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-uwsgi-python3-2.0.28-1.1.x86_64",
"product": {
"name": "python310-uwsgi-python3-2.0.28-1.1.x86_64",
"product_id": "python310-uwsgi-python3-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-uwsgi-python3-2.0.28-1.1.x86_64",
"product": {
"name": "python311-uwsgi-python3-2.0.28-1.1.x86_64",
"product_id": "python311-uwsgi-python3-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-uwsgi-python3-2.0.28-1.1.x86_64",
"product": {
"name": "python312-uwsgi-python3-2.0.28-1.1.x86_64",
"product_id": "python312-uwsgi-python3-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-2.0.28-1.1.x86_64",
"product_id": "uwsgi-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-emperor_pg-2.0.28-1.1.x86_64",
"product_id": "uwsgi-emperor_pg-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.x86_64",
"product_id": "uwsgi-emperor_zeromq-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-gevent-2.0.28-1.1.x86_64",
"product_id": "uwsgi-gevent-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-glusterfs-2.0.28-1.1.x86_64",
"product_id": "uwsgi-glusterfs-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-greenlet-2.0.28-1.1.x86_64",
"product_id": "uwsgi-greenlet-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-jvm-2.0.28-1.1.x86_64",
"product_id": "uwsgi-jvm-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-ldap-2.0.28-1.1.x86_64",
"product_id": "uwsgi-ldap-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-libffi-2.0.28-1.1.x86_64",
"product_id": "uwsgi-libffi-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-logzmq-2.0.28-1.1.x86_64",
"product_id": "uwsgi-logzmq-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-lua-2.0.28-1.1.x86_64",
"product_id": "uwsgi-lua-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-pam-2.0.28-1.1.x86_64",
"product_id": "uwsgi-pam-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-php8-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-php8-2.0.28-1.1.x86_64",
"product_id": "uwsgi-php8-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-psgi-2.0.28-1.1.x86_64",
"product_id": "uwsgi-psgi-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-pypy-2.0.28-1.1.x86_64",
"product_id": "uwsgi-pypy-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-sqlite3-2.0.28-1.1.x86_64",
"product_id": "uwsgi-sqlite3-2.0.28-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.28-1.1.x86_64",
"product": {
"name": "uwsgi-xslt-2.0.28-1.1.x86_64",
"product_id": "uwsgi-xslt-2.0.28-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.aarch64"
},
"product_reference": "apache2-mod_uwsgi-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.ppc64le"
},
"product_reference": "apache2-mod_uwsgi-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.s390x"
},
"product_reference": "apache2-mod_uwsgi-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.x86_64"
},
"product_reference": "apache2-mod_uwsgi-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-uwsgi-python3-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.aarch64"
},
"product_reference": "python310-uwsgi-python3-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-uwsgi-python3-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.ppc64le"
},
"product_reference": "python310-uwsgi-python3-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-uwsgi-python3-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.s390x"
},
"product_reference": "python310-uwsgi-python3-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-uwsgi-python3-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.x86_64"
},
"product_reference": "python310-uwsgi-python3-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-uwsgi-python3-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.aarch64"
},
"product_reference": "python311-uwsgi-python3-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-uwsgi-python3-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.ppc64le"
},
"product_reference": "python311-uwsgi-python3-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-uwsgi-python3-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.s390x"
},
"product_reference": "python311-uwsgi-python3-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-uwsgi-python3-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.x86_64"
},
"product_reference": "python311-uwsgi-python3-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-uwsgi-python3-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.aarch64"
},
"product_reference": "python312-uwsgi-python3-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-uwsgi-python3-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.ppc64le"
},
"product_reference": "python312-uwsgi-python3-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-uwsgi-python3-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.s390x"
},
"product_reference": "python312-uwsgi-python3-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-uwsgi-python3-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.x86_64"
},
"product_reference": "python312-uwsgi-python3-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-emperor_pg-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-emperor_pg-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-emperor_pg-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-emperor_pg-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-gevent-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-gevent-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-gevent-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-gevent-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-glusterfs-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-glusterfs-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-glusterfs-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-glusterfs-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-greenlet-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-greenlet-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-greenlet-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-greenlet-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-jvm-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-jvm-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-jvm-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-jvm-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-ldap-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-ldap-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-ldap-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-ldap-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-libffi-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-libffi-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-libffi-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-libffi-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-logzmq-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-logzmq-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-logzmq-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-logzmq-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-lua-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-lua-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-lua-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-lua-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-pam-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-pam-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-pam-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-pam-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php8-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-php8-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php8-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-php8-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php8-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-php8-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php8-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-php8-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-psgi-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-psgi-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-psgi-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-psgi-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-pypy-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-pypy-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-pypy-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-pypy-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-sqlite3-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-sqlite3-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-sqlite3-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-sqlite3-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.28-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.aarch64"
},
"product_reference": "uwsgi-xslt-2.0.28-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.28-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.ppc64le"
},
"product_reference": "uwsgi-xslt-2.0.28-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.28-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.s390x"
},
"product_reference": "uwsgi-xslt-2.0.28-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.28-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.x86_64"
},
"product_reference": "uwsgi-xslt-2.0.28-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-24795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24795"
}
],
"notes": [
{
"category": "general",
"text": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24795",
"url": "https://www.suse.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "SUSE Bug 1222332 for CVE-2024-24795",
"url": "https://bugzilla.suse.com/1222332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:apache2-mod_uwsgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python310-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python311-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:python312-uwsgi-python3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-emperor_pg-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-emperor_zeromq-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-gevent-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-glusterfs-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-greenlet-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-jvm-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-ldap-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-libffi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-logzmq-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-lua-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-pam-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-php8-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-psgi-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-pypy-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-sqlite3-2.0.28-1.1.x86_64",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.aarch64",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.ppc64le",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.s390x",
"openSUSE Tumbleweed:uwsgi-xslt-2.0.28-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-11-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-24795"
}
]
}
CNVD-2024-36394
Vulnerability from cnvd - Published: 2024-08-26厂商已发布了漏洞修复程序,请及时关注更新: https://httpd.apache.org/security/vulnerabilities_24.html
| Name | Apache HTTP Server >=2.4.0,<=2.4.58 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-24795"
}
},
"description": "Apache HTTP Server\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90\u7f51\u9875\u670d\u52a1\u5668\u3002\u8be5\u670d\u52a1\u5668\u5177\u6709\u5feb\u901f\u3001\u53ef\u9760\u4e14\u53ef\u901a\u8fc7\u7b80\u5355\u7684API\u8fdb\u884c\u6269\u5145\u7684\u7279\u70b9\u3002\n\nApache HTTP Server\u5b58\u5728\u54cd\u5e94\u62c6\u5206\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610fHTTP\u6807\u5934\uff0c\u5e76\u5728\u5355\u51fbURL\u540e\u5bfc\u81f4\u670d\u52a1\u5668\u8fd4\u56de\u5206\u88c2\u54cd\u5e94\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://httpd.apache.org/security/vulnerabilities_24.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-36394",
"openTime": "2024-08-26",
"patchDescription": "Apache HTTP Server\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90\u7f51\u9875\u670d\u52a1\u5668\u3002\u8be5\u670d\u52a1\u5668\u5177\u6709\u5feb\u901f\u3001\u53ef\u9760\u4e14\u53ef\u901a\u8fc7\u7b80\u5355\u7684API\u8fdb\u884c\u6269\u5145\u7684\u7279\u70b9\u3002\r\n\r\nApache HTTP Server\u5b58\u5728\u54cd\u5e94\u62c6\u5206\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610fHTTP\u6807\u5934\uff0c\u5e76\u5728\u5355\u51fbURL\u540e\u5bfc\u81f4\u670d\u52a1\u5668\u8fd4\u56de\u5206\u88c2\u54cd\u5e94\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apache HTTP Server\u54cd\u5e94\u62c6\u5206\u6f0f\u6d1e\uff08CNVD-2024-36394\uff09\u7684\u8865\u4e01",
"products": {
"product": "Apache HTTP Server \u003e=2.4.0\uff0c\u003c=2.4.58"
},
"referenceLink": "https://cxsecurity.com/cveshow/CVE-2024-24795/",
"serverity": "\u9ad8",
"submitTime": "2024-04-09",
"title": "Apache HTTP Server\u54cd\u5e94\u62c6\u5206\u6f0f\u6d1e\uff08CNVD-2024-36394\uff09"
}
FKIE_CVE-2024-24795
Vulnerability from fkie_nvd - Published: 2024-04-04 20:15 - Updated: 2025-06-30 12:55| URL | Tags | ||
|---|---|---|---|
| security@apache.org | https://httpd.apache.org/security/vulnerabilities_24.html | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Jul/18 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/04/04/5 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://httpd.apache.org/security/vulnerabilities_24.html | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240415-0013/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT214119 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | http_server | * | |
| debian | debian_linux | 10.0 | |
| fedoraproject | fedora | 38 | |
| fedoraproject | fedora | 39 | |
| fedoraproject | fedora | 40 | |
| netapp | ontap | 9 | |
| netapp | ontap_tools | 10 | |
| broadcom | fabric_operating_system | - | |
| apple | macos | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D18D7BEC-F363-44D3-8926-B3042AFC1E50",
"versionEndExcluding": "2.4.59",
"versionStartIncluding": "2.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
"matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "5333B745-F7A3-46CB-8437-8668DB08CD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "046FB51E-B768-44D3-AEB5-D857145CA840",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9",
"versionEndExcluding": "14.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
},
{
"lang": "es",
"value": "La divisi\u00f3n de la respuesta HTTP en varios m\u00f3dulos en el servidor HTTP Apache permite que un atacante pueda inyectar encabezados de respuesta maliciosos en aplicaciones backend para provocar un ataque de desincronizaci\u00f3n HTTP. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.59, que soluciona este problema."
}
],
"id": "CVE-2024-24795",
"lastModified": "2025-06-30T12:55:47.280",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-04-04T20:15:08.663",
"references": [
{
"source": "security@apache.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://seclists.org/fulldisclosure/2024/Jul/18"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/04/04/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT214119"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-113"
}
],
"source": "security@apache.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-444"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
RHSA-2025:3453
Vulnerability from csaf_redhat - Published: 2025-04-02 17:06 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.62 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References section.\n\nSecurity Fix(es):\n\n* expat: parsing large tokens can trigger a denial of service (CVE-2023-52425)\n* expat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490)\n* httpd: HTTP Response Splitting in multiple modules (CVE-2024-24795)\n* libxml2: libxml2: Use-After-Free in libxml2 (CVE-2024-56171)\n* libxml2: libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928)\n* mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387)\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3453",
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_release_notes/index"
},
{
"category": "external",
"summary": "2262877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262877"
},
{
"category": "external",
"summary": "2273499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273499"
},
{
"category": "external",
"summary": "2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "2295006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295006"
},
{
"category": "external",
"summary": "2308615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308615"
},
{
"category": "external",
"summary": "2346416",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346416"
},
{
"category": "external",
"summary": "2346421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346421"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3453.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:06+00:00",
"generator": {
"date": "2025-12-09T09:09:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2025:3453",
"initial_release_date": "2025-04-02T17:06:49+00:00",
"revision_history": [
{
"date": "2025-04-02T17:06:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T13:06:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services 2.4.62",
"product": {
"name": "Red Hat JBoss Core Services 2.4.62",
"product_id": "Red Hat JBoss Core Services 2.4.62",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-02-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2262877"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Expat (libexpat). When parsing a large token that requires multiple buffer fills to complete, Expat has to re-parse the token from start numerous times. This process may trigger excessive resource consumption, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: parsing large tokens can trigger a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified flaw in Expat presents a moderate severity issue due to its potential to facilitate resource exhaustion attacks, particularly in scenarios involving parsing large tokens requiring multiple buffer fills. As Expat repeatedly re-parses such tokens from the beginning, it results in disproportionate resource consumption, leading to a denial-of-service (DoS) condition. While the impact is significant, the exploitation requires specific conditions, such as parsing large tokens, which may not always align with typical usage patterns.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52425"
},
{
"category": "external",
"summary": "RHBZ#2262877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262877"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425"
}
],
"release_date": "2024-02-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:06:49+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "expat: parsing large tokens can trigger a denial of service"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294581"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the \u0027no overlap\u0027 response in ALPN or uses the output as the opportunistic protocol in NPN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_select_next_proto buffer overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "RHBZ#2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:06:49+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: SSL_select_next_proto buffer overread"
},
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2024-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in httpd. An HTTP response splitting in multiple httpd modules may allow an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: HTTP Response Splitting in multiple modules",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects configurations when at least one of the following modules is loaded and being used: mod_authnz_fcgi, mod_cgi, mod_cgid, mod_proxy_fcgi, mod_proxy_scgi and mod_proxy_uwsgi. Additionally, this flaw is only exploitable by a malicious backend in a reverse proxy configuration or an attack against a backend application that inserts headers.\n\nThese modules are enabled by default in Red Hat Enterprise Linux 8, 9, and in RHSCL mod_authnz_fcgi is not available in RHEL8 and RHSCL. These modules can be disabled via the configuration file if their functionality is not being used.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "RHBZ#2273499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24795"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-24795",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-24795"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:06:49+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: HTTP Response Splitting in multiple modules"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-01T19:20:21+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2295006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Apache HTTP Server. Serving WebSocket protocol upgrades over an HTTP/2 connection could result in a NULL pointer dereference, leading to a crash of the server process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_http2: DoS by null pointer in websocket over HTTP/2",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36387"
},
{
"category": "external",
"summary": "RHBZ#2295006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36387"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2024-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:06:49+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mod_http2: DoS by null pointer in websocket over HTTP/2"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2024-08-30T03:20:06.675968+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308615"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libexpat\u0027s xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libexpat: Negative Length Parsing Vulnerability in libexpat",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-45490 vulnerability is rated as moderate severity because while it allows for memory corruption through improper argument handling in XML_ParseBuffer, the exploitability is limited. Specifically, it requires an unlikely scenario where the input passed to the function has a negative length (len \u003c 0), which would typically not occur in well-formed applications. Moreover, while the impact includes denial of service (DoS), the conditions necessary for arbitrary code execution are non-trivial, requiring specific exploitation of memory corruption. Since it primarily leads to application crashes without an easily accessible attack vector for remote code execution, the risk is lower compared to higher-severity vulnerabilities that offer more direct pathways to exploitation.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow or Wraparound vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBaseline configurations and configuration controls enforce secure system and software settings, while least functionality reduces the attack surface by disabling unnecessary services and ports. In the event of successful exploitation, process isolation ensures that memory corruption is contained within the originating process, preventing it from affecting other processes or the system as a whole. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions. These controls help detect and prevent malicious code that attempts to exploit integer overflow vulnerabilities through mechanisms like file integrity checks and patch management. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are used to enhance resilience against integer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45490"
},
{
"category": "external",
"summary": "RHBZ#2308615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45490"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes",
"url": "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/887",
"url": "https://github.com/libexpat/libexpat/issues/887"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/890",
"url": "https://github.com/libexpat/libexpat/pull/890"
}
],
"release_date": "2024-08-30T03:15:03.757000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:06:49+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libexpat: Negative Length Parsing Vulnerability in libexpat"
},
{
"cve": "CVE-2024-56171",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-02-18T23:01:25.366636+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2346416"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2. This vulnerability allows a use-after-free via a crafted XML document validated against an XML schema with certain identity constraints or a crafted XML schema.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Use-After-Free in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important because it involves a use-after-free flaw in the xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables functions. A maliciously crafted XML document or schema, containing specific identity constraints, can be used to trigger this vulnerability and potentially gain unauthorized access or cause a denial-of-service condition.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-56171"
},
{
"category": "external",
"summary": "RHBZ#2346416",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346416"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56171"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828"
}
],
"release_date": "2025-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:06:49+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml2: Use-After-Free in libxml2"
},
{
"cve": "CVE-2025-24928",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-02-18T23:01:36.502916+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2346421"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important because it involves a stack-based buffer overflow in the xmlSnprintfElements function within valid.c. Exploiting this issue requires DTD validation to occur on an untrusted document or untrusted DTD, making it a potential security risk for applications using libxml2 that do not adequately restrict DTD input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24928"
},
{
"category": "external",
"summary": "RHBZ#2346421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346421"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24928",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24928"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/847",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/847"
},
{
"category": "external",
"summary": "https://issues.oss-fuzz.com/issues/392687022",
"url": "https://issues.oss-fuzz.com/issues/392687022"
}
],
"release_date": "2025-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:06:49+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2"
}
]
}
RHSA-2024:9306
Vulnerability from csaf_redhat - Published: 2024-11-12 09:33 - Updated: 2025-11-21 19:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: HTTP response splitting (CVE-2023-38709)\n\n* httpd: HTTP Response Splitting in multiple modules (CVE-2024-24795)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9306",
"url": "https://access.redhat.com/errata/RHSA-2024:9306"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2273491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273491"
},
{
"category": "external",
"summary": "2273499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273499"
},
{
"category": "external",
"summary": "RHEL-14668",
"url": "https://issues.redhat.com/browse/RHEL-14668"
},
{
"category": "external",
"summary": "RHEL-49856",
"url": "https://issues.redhat.com/browse/RHEL-49856"
},
{
"category": "external",
"summary": "RHEL-6575",
"url": "https://issues.redhat.com/browse/RHEL-6575"
},
{
"category": "external",
"summary": "RHEL-6576",
"url": "https://issues.redhat.com/browse/RHEL-6576"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9306.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2025-11-21T19:16:10+00:00",
"generator": {
"date": "2025-11-21T19:16:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:9306",
"initial_release_date": "2024-11-12T09:33:27+00:00",
"revision_history": [
{
"date": "2024-11-12T09:33:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T09:33:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:16:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-1.el9.src",
"product": {
"name": "httpd-0:2.4.62-1.el9.src",
"product_id": "httpd-0:2.4.62-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-1.el9.aarch64",
"product": {
"name": "httpd-0:2.4.62-1.el9.aarch64",
"product_id": "httpd-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.62-1.el9.aarch64",
"product": {
"name": "httpd-core-0:2.4.62-1.el9.aarch64",
"product_id": "httpd-core-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.62-1.el9.aarch64",
"product": {
"name": "httpd-devel-0:2.4.62-1.el9.aarch64",
"product_id": "httpd-devel-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.62-1.el9.aarch64",
"product": {
"name": "httpd-tools-0:2.4.62-1.el9.aarch64",
"product_id": "httpd-tools-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_ldap-0:2.4.62-1.el9.aarch64",
"product_id": "mod_ldap-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_lua-0:2.4.62-1.el9.aarch64",
"product_id": "mod_lua-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_proxy_html-1:2.4.62-1.el9.aarch64",
"product_id": "mod_proxy_html-1:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.62-1.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_session-0:2.4.62-1.el9.aarch64",
"product_id": "mod_session-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_ssl-1:2.4.62-1.el9.aarch64",
"product_id": "mod_ssl-1:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.62-1.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.62-1.el9.aarch64",
"product": {
"name": "httpd-debugsource-0:2.4.62-1.el9.aarch64",
"product_id": "httpd-debugsource-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"product": {
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"product_id": "httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"product": {
"name": "httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"product_id": "httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"product_id": "httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"product_id": "mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"product_id": "mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"product_id": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.62-1.el9?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"product_id": "mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.62-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"product_id": "mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.62-1.el9?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "httpd-0:2.4.62-1.el9.ppc64le",
"product_id": "httpd-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "httpd-core-0:2.4.62-1.el9.ppc64le",
"product_id": "httpd-core-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "httpd-devel-0:2.4.62-1.el9.ppc64le",
"product_id": "httpd-devel-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "httpd-tools-0:2.4.62-1.el9.ppc64le",
"product_id": "httpd-tools-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_ldap-0:2.4.62-1.el9.ppc64le",
"product_id": "mod_ldap-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_lua-0:2.4.62-1.el9.ppc64le",
"product_id": "mod_lua-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"product_id": "mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.62-1.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_session-0:2.4.62-1.el9.ppc64le",
"product_id": "mod_session-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_ssl-1:2.4.62-1.el9.ppc64le",
"product_id": "mod_ssl-1:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.62-1.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"product_id": "httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_id": "httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_id": "httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_id": "httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_id": "mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_id": "mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"product_id": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.62-1.el9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_id": "mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.62-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"product_id": "mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.62-1.el9?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-1.el9.x86_64",
"product": {
"name": "httpd-0:2.4.62-1.el9.x86_64",
"product_id": "httpd-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.62-1.el9.x86_64",
"product": {
"name": "httpd-core-0:2.4.62-1.el9.x86_64",
"product_id": "httpd-core-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.62-1.el9.x86_64",
"product": {
"name": "httpd-devel-0:2.4.62-1.el9.x86_64",
"product_id": "httpd-devel-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.62-1.el9.x86_64",
"product": {
"name": "httpd-tools-0:2.4.62-1.el9.x86_64",
"product_id": "httpd-tools-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_ldap-0:2.4.62-1.el9.x86_64",
"product_id": "mod_ldap-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_lua-0:2.4.62-1.el9.x86_64",
"product_id": "mod_lua-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_proxy_html-1:2.4.62-1.el9.x86_64",
"product_id": "mod_proxy_html-1:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.62-1.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_session-0:2.4.62-1.el9.x86_64",
"product_id": "mod_session-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_ssl-1:2.4.62-1.el9.x86_64",
"product_id": "mod_ssl-1:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.62-1.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.62-1.el9.x86_64",
"product": {
"name": "httpd-debugsource-0:2.4.62-1.el9.x86_64",
"product_id": "httpd-debugsource-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"product": {
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"product_id": "httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"product_id": "httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"product_id": "httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"product_id": "mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"product_id": "mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"product_id": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.62-1.el9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"product_id": "mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.62-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64",
"product_id": "mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.62-1.el9?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.62-1.el9.s390x",
"product": {
"name": "httpd-0:2.4.62-1.el9.s390x",
"product_id": "httpd-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-core-0:2.4.62-1.el9.s390x",
"product": {
"name": "httpd-core-0:2.4.62-1.el9.s390x",
"product_id": "httpd-core-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.62-1.el9.s390x",
"product": {
"name": "httpd-devel-0:2.4.62-1.el9.s390x",
"product_id": "httpd-devel-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.62-1.el9.s390x",
"product": {
"name": "httpd-tools-0:2.4.62-1.el9.s390x",
"product_id": "httpd-tools-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.62-1.el9.s390x",
"product": {
"name": "mod_ldap-0:2.4.62-1.el9.s390x",
"product_id": "mod_ldap-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_lua-0:2.4.62-1.el9.s390x",
"product": {
"name": "mod_lua-0:2.4.62-1.el9.s390x",
"product_id": "mod_lua-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.62-1.el9.s390x",
"product": {
"name": "mod_proxy_html-1:2.4.62-1.el9.s390x",
"product_id": "mod_proxy_html-1:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.62-1.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.62-1.el9.s390x",
"product": {
"name": "mod_session-0:2.4.62-1.el9.s390x",
"product_id": "mod_session-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.62-1.el9.s390x",
"product": {
"name": "mod_ssl-1:2.4.62-1.el9.s390x",
"product_id": "mod_ssl-1:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.62-1.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.62-1.el9.s390x",
"product": {
"name": "httpd-debugsource-0:2.4.62-1.el9.s390x",
"product_id": "httpd-debugsource-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"product": {
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"product_id": "httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.62-1.el9.s390x",
"product": {
"name": "httpd-debuginfo-0:2.4.62-1.el9.s390x",
"product_id": "httpd-debuginfo-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"product_id": "httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"product_id": "mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"product": {
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"product_id": "mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"product_id": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.62-1.el9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"product": {
"name": "mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"product_id": "mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.62-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"product_id": "mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.62-1.el9?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-filesystem-0:2.4.62-1.el9.noarch",
"product": {
"name": "httpd-filesystem-0:2.4.62-1.el9.noarch",
"product_id": "httpd-filesystem-0:2.4.62-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.62-1.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.4.62-1.el9.noarch",
"product": {
"name": "httpd-manual-0:2.4.62-1.el9.noarch",
"product_id": "httpd-manual-0:2.4.62-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.62-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64"
},
"product_reference": "httpd-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "httpd-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x"
},
"product_reference": "httpd-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src"
},
"product_reference": "httpd-0:2.4.62-1.el9.src",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64"
},
"product_reference": "httpd-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64"
},
"product_reference": "httpd-core-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "httpd-core-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x"
},
"product_reference": "httpd-core-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64"
},
"product_reference": "httpd-core-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64"
},
"product_reference": "httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x"
},
"product_reference": "httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-core-debuginfo-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64"
},
"product_reference": "httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64"
},
"product_reference": "httpd-debugsource-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x"
},
"product_reference": "httpd-debugsource-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64"
},
"product_reference": "httpd-debugsource-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64"
},
"product_reference": "httpd-devel-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x"
},
"product_reference": "httpd-devel-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64"
},
"product_reference": "httpd-devel-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.62-1.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch"
},
"product_reference": "httpd-filesystem-0:2.4.62-1.el9.noarch",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.62-1.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch"
},
"product_reference": "httpd-manual-0:2.4.62-1.el9.noarch",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64"
},
"product_reference": "httpd-tools-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x"
},
"product_reference": "httpd-tools-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64"
},
"product_reference": "httpd-tools-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_ldap-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x"
},
"product_reference": "mod_ldap-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_ldap-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_lua-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_lua-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x"
},
"product_reference": "mod_lua-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_lua-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x"
},
"product_reference": "mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_lua-debuginfo-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_session-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_session-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x"
},
"product_reference": "mod_session-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_session-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x"
},
"product_reference": "mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_ssl-1:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x"
},
"product_reference": "mod_ssl-1:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_ssl-1:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2024-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273491"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in httpd. The response headers are not sanitized before an HTTP response is sent when a malicious backend can insert a Content-Type, Content-Encoding, or some other headers, resulting in an HTTP response splitting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: HTTP response splitting",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is only exploitable by a malicious backend or a malicious application, but may also affect forward proxy configurations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38709"
},
{
"category": "external",
"summary": "RHBZ#2273491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273491"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38709"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-38709",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-38709"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T09:33:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9306"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: HTTP response splitting"
},
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2024-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in httpd. An HTTP response splitting in multiple httpd modules may allow an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: HTTP Response Splitting in multiple modules",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects configurations when at least one of the following modules is loaded and being used: mod_authnz_fcgi, mod_cgi, mod_cgid, mod_proxy_fcgi, mod_proxy_scgi and mod_proxy_uwsgi. Additionally, this flaw is only exploitable by a malicious backend in a reverse proxy configuration or an attack against a backend application that inserts headers.\n\nThese modules are enabled by default in Red Hat Enterprise Linux 8, 9, and in RHSCL mod_authnz_fcgi is not available in RHEL8 and RHSCL. These modules can be disabled via the configuration file if their functionality is not being used.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "RHBZ#2273499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24795"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-24795",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-24795"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T09:33:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9306"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.src",
"AppStream-9.5.0.GA:httpd-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-core-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-debugsource-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-devel-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-filesystem-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-manual-0:2.4.62-1.el9.noarch",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:httpd-tools-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ldap-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_lua-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_proxy_html-debuginfo-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_session-debuginfo-0:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-1:2.4.62-1.el9.x86_64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.aarch64",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.ppc64le",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.s390x",
"AppStream-9.5.0.GA:mod_ssl-debuginfo-1:2.4.62-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: HTTP Response Splitting in multiple modules"
}
]
}
RHSA-2025:3452
Vulnerability from csaf_redhat - Published: 2025-04-02 17:15 - Updated: 2025-12-09 09:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Core Services.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 6, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* httpd: HTTP Response Splitting in multiple modules (CVE-2024-24795)\n* mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387)\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3452",
"url": "https://access.redhat.com/errata/RHSA-2025:3452"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_release_notes/index"
},
{
"category": "external",
"summary": "2273499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273499"
},
{
"category": "external",
"summary": "2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "2295006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295006"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3452.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 security update",
"tracking": {
"current_release_date": "2025-12-09T09:09:06+00:00",
"generator": {
"date": "2025-12-09T09:09:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2025:3452",
"initial_release_date": "2025-04-02T17:15:43+00:00",
"revision_history": [
{
"date": "2025-04-02T17:15:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T13:32:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-09T09:09:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 8",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"product_id": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.7.5-3.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"product_id": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1k-19.el7jbcs?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"product_id": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.64.0-2.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"product_id": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-jansson@2.14-4.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"product_id": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.3-2.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-23.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.12-3.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"product_id": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl@8.11.0-2.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-5.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@2.0.29-3.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.50-8.redhat_1.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.28-9.el7jbcs?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-3.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.6-10.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"product_id": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.1.0-5.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"product_id": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.7.5-3.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"product_id": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.3-2.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-5.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@2.0.29-3.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.50-8.redhat_1.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.28-9.el8jbcs?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-3.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.6-10.el8jbcs?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.7.5-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.7.5-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.7.5-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1k-19.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1k-19.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1k-19.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1k-19.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1k-19.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1k-19.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.64.0-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.64.0-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.64.0-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-jansson@2.14-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-jansson-devel@2.14-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-jansson-debuginfo@2.14-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.3-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-23.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-23.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.12-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.12-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl@8.11.0-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@8.11.0-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@8.11.0-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@8.11.0-2.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.62-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.62-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.62-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.62-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.62-5.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.62-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.62-5.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.62-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@2.0.29-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@2.0.29-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.50-8.redhat_1.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.50-8.redhat_1.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.28-9.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.28-9.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.22-3.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.6-10.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.6-10.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.1.0-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-devel@1.1.0-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-debuginfo@1.1.0-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.7.5-3.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.7.5-3.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.7.5-3.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.3-2.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.62-5.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.62-5.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.62-5.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.62-5.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.62-5.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@2.0.29-3.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@2.0.29-3.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.50-8.redhat_1.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.50-8.redhat_1.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.28-9.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.28-9.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-3.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.22-3.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.6-10.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.6-10.el8jbcs?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.62-5.el7jbcs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.62-5.el8jbcs?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-06-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294581"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the \u0027no overlap\u0027 response in ALPN or uses the output as the opportunistic protocol in NPN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_select_next_proto buffer overread",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64"
],
"known_not_affected": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "RHBZ#2294581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:15:43+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3452"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: SSL_select_next_proto buffer overread"
},
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2024-04-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in httpd. An HTTP response splitting in multiple httpd modules may allow an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: HTTP Response Splitting in multiple modules",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects configurations when at least one of the following modules is loaded and being used: mod_authnz_fcgi, mod_cgi, mod_cgid, mod_proxy_fcgi, mod_proxy_scgi and mod_proxy_uwsgi. Additionally, this flaw is only exploitable by a malicious backend in a reverse proxy configuration or an attack against a backend application that inserts headers.\n\nThese modules are enabled by default in Red Hat Enterprise Linux 8, 9, and in RHSCL mod_authnz_fcgi is not available in RHEL8 and RHSCL. These modules can be disabled via the configuration file if their functionality is not being used.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
],
"known_not_affected": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "RHBZ#2273499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24795"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-24795",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-24795"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:15:43+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3452"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: HTTP Response Splitting in multiple modules"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-01T19:20:21+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2295006"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Apache HTTP Server. Serving WebSocket protocol upgrades over an HTTP/2 connection could result in a NULL pointer dereference, leading to a crash of the server process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_http2: DoS by null pointer in websocket over HTTP/2",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64"
],
"known_not_affected": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36387"
},
{
"category": "external",
"summary": "RHBZ#2295006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36387"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2024-07-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T17:15:43+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3452"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.1.0-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-jansson-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.14-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-8.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.64.0-2.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-23.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-19.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-3.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-19.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.5-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-2.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-8.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-8.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-9.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-3.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-10.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-5.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mod_http2: DoS by null pointer in websocket over HTTP/2"
}
]
}
ICSA-24-319-04
Vulnerability from csaf_cisa - Published: 2024-11-12 00:00 - Updated: 2024-11-12 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINEC NMS before V3.0 SP1 is affected by multiple vulnerabilities.\n\nSiemens has released a new version for SINEC NMS and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-331112: Multiple Vulnerabilities in SINEC NMS Before V3.0 SP1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-331112.json"
},
{
"category": "self",
"summary": "SSA-331112: Multiple Vulnerabilities in SINEC NMS Before V3.0 SP1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-331112.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-319-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-319-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-319-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SINEC NMS",
"tracking": {
"current_release_date": "2024-11-12T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-319-04",
"initial_release_date": "2024-11-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-11-12T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0_SP1",
"product": {
"name": "SINEC NMS",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SINEC NMS"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers.\r\n\r\nImpact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes.\r\n\r\nWhen calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.\r\n\r\nFor the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse.\r\n\r\nBoth truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical.\r\n\r\nChanging the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall.\r\n\r\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\r\n\r\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary.\r\n\r\nOpenSSL 3.1 and 3.0 are vulnerable to this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: The POLY1305 MAC (message authentication code) implementation\r\ncontains a bug that might corrupt the internal state of applications running\r\non PowerPC CPU based platforms if the CPU provides vector instructions.\r\n\r\nImpact summary: If an attacker can influence whether the POLY1305 MAC\r\nalgorithm is used, the application state might be corrupted with various\r\napplication dependent consequences.\r\n\r\nThe POLY1305 MAC (message authentication code) implementation in OpenSSL for\r\nPowerPC CPUs restores the contents of vector registers in a different order\r\nthan they are saved. Thus the contents of some of these vector registers\r\nare corrupted when returning to the caller. The vulnerable code is used only\r\non newer PowerPC processors supporting the PowerISA 2.07 instructions.\r\n\r\nThe consequences of this kind of internal application state corruption can\r\nbe various - from no consequences, if the calling application does not\r\ndepend on the contents of non-volatile XMM registers at all, to the worst\r\nconsequences, where the attacker could get complete control of the application\r\nprocess. However unless the compiler uses the vector registers for storing\r\npointers, the most likely consequence, if any, would be an incorrect result\r\nof some application dependent calculations or a crash leading to a denial of\r\nservice.\r\n\r\nThe POLY1305 MAC algorithm is most frequently used as part of the\r\nCHACHA20-POLY1305 AEAD (authenticated encryption with associated data)\r\nalgorithm. The most common usage of this AEAD cipher is with TLS protocol\r\nversions 1.2 and 1.3. If this cipher is enabled on the server a malicious\r\nclient can influence whether this AEAD cipher is used. This implies that\r\nTLS server applications using OpenSSL can be potentially impacted. However\r\nwe are currently not aware of any concrete application that would be affected\r\nby this issue therefore we consider this a Low severity security issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that application is also vulnerable if used with the \u0027-pubin\u0027 and \u0027-check\u0027 options on untrusted data. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46280",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read vulnerability. This could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-46280"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL\r\nto crash leading to a potential Denial of Service attack\r\n\r\nImpact summary: Applications loading files in the PKCS12 format from untrusted\r\nsources might terminate abruptly.\r\n\r\nA file in PKCS12 format can contain certificates and keys and may come from an\r\nuntrusted source. The PKCS12 specification allows certain fields to be NULL, but\r\nOpenSSL does not correctly check for this case. This can lead to a NULL pointer\r\ndereference that results in OpenSSL crashing. If an application processes PKCS12\r\nfiles from an untrusted source using the OpenSSL APIs then that application will\r\nbe vulnerable to this issue.\r\n\r\nOpenSSL APIs that are vulnerable to this are: PKCS12_parse(),\r\nPKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()\r\nand PKCS12_newpass().\r\n\r\nWe have also fixed a similar issue in SMIME_write_PKCS7(). However since this\r\nfunction is related to writing data we do not consider it security significant.\r\n\r\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-2379",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-2379"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-2466",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"notes": [
{
"category": "summary",
"text": "libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-27316",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-47808",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "The affected application contains a database function, that does not properly restrict the permissions of users to write to the filesystem of the host system.\r\nThis could allow an authenticated medium-privileged attacker to write arbitrary content to any location in the filesystem of the host system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.0 SP1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974917/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-47808"
}
]
}
SUSE-SU-2024:3861-1
Vulnerability from csaf_suse - Published: 2024-11-01 06:34 - Updated: 2024-11-01 06:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for uwsgi",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for uwsgi fixes the following issues:\n\n- CVE-2024-24795: Fixed HTTP Response Splitting in multiple modules (bsc#1222332)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3861,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3861,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3861,openSUSE-SLE-15.5-2024-3861,openSUSE-SLE-15.6-2024-3861",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3861-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3861-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243861-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3861-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZWV2MVSBRL4AIHT5O6LIOEUFMOC3TUBS/"
},
{
"category": "self",
"summary": "SUSE Bug 1222332",
"url": "https://bugzilla.suse.com/1222332"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24795 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24795/"
}
],
"title": "Security update for uwsgi",
"tracking": {
"current_release_date": "2024-11-01T06:34:00Z",
"generator": {
"date": "2024-11-01T06:34:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3861-1",
"initial_release_date": "2024-11-01T06:34:00Z",
"revision_history": [
{
"date": "2024-11-01T06:34:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"product_id": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.i586",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-gevent-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-jvm-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-ldap-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-libffi-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-lua-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-pam-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-php7-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-psgi-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-pypy-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-python3-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.i586",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.i586",
"product_id": "uwsgi-xslt-2.0.19.1-150400.8.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"product_id": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"product_id": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"product_id": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64"
},
"product_reference": "uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-24795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24795"
}
],
"notes": [
{
"category": "general",
"text": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24795",
"url": "https://www.suse.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "SUSE Bug 1222332 for CVE-2024-24795",
"url": "https://bugzilla.suse.com/1222332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.5:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:apache2-mod_uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-emperor_pg-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-gevent-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-glusterfs-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-greenlet-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-jvm-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-ldap-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-libffi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-logzmq-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-lua-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-pam-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-php7-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-psgi-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-pypy-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-python3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-sqlite3-2.0.19.1-150400.8.3.1.x86_64",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.aarch64",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.ppc64le",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.s390x",
"openSUSE Leap 15.6:uwsgi-xslt-2.0.19.1-150400.8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-11-01T06:34:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-24795"
}
]
}
SUSE-SU-2024:1627-1
Vulnerability from csaf_suse - Published: 2024-05-13 15:14 - Updated: 2024-05-13 15:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2023-38709: Fixed faulty input validation inside the HTTP response splitting code (bsc#1222330).\n- CVE-2024-24795: Fixed handling of malicious HTTP splitting response headers in multiple modules (bsc#1222332).\n- CVE-2024-27316: Fixed HTTP/2 CONTINUATION frames that could have been utilized for DoS attacks (bsc#1221401).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1627,SUSE-SLE-SDK-12-SP5-2024-1627,SUSE-SLE-SERVER-12-SP5-2024-1627",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1627-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1627-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241627-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1627-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018514.html"
},
{
"category": "self",
"summary": "SUSE Bug 1221401",
"url": "https://bugzilla.suse.com/1221401"
},
{
"category": "self",
"summary": "SUSE Bug 1222330",
"url": "https://bugzilla.suse.com/1222330"
},
{
"category": "self",
"summary": "SUSE Bug 1222332",
"url": "https://bugzilla.suse.com/1222332"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38709 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24795 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27316 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27316/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2024-05-13T15:14:22Z",
"generator": {
"date": "2024-05-13T15:14:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1627-1",
"initial_release_date": "2024-05-13T15:14:22Z",
"revision_history": [
{
"date": "2024-05-13T15:14:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-2.4.51-35.41.1.aarch64",
"product_id": "apache2-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-devel-2.4.51-35.41.1.aarch64",
"product_id": "apache2-devel-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-event-2.4.51-35.41.1.aarch64",
"product_id": "apache2-event-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.51-35.41.1.aarch64",
"product_id": "apache2-example-pages-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.51-35.41.1.aarch64",
"product_id": "apache2-prefork-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-tls13-2.4.51-35.41.1.aarch64",
"product_id": "apache2-tls13-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"product_id": "apache2-tls13-devel-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-tls13-event-2.4.51-35.41.1.aarch64",
"product_id": "apache2-tls13-event-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"product_id": "apache2-tls13-example-pages-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"product_id": "apache2-tls13-prefork-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"product_id": "apache2-tls13-utils-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"product_id": "apache2-tls13-worker-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-utils-2.4.51-35.41.1.aarch64",
"product_id": "apache2-utils-2.4.51-35.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.41.1.aarch64",
"product": {
"name": "apache2-worker-2.4.51-35.41.1.aarch64",
"product_id": "apache2-worker-2.4.51-35.41.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-2.4.51-35.41.1.i586",
"product_id": "apache2-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-devel-2.4.51-35.41.1.i586",
"product_id": "apache2-devel-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-event-2.4.51-35.41.1.i586",
"product_id": "apache2-event-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-example-pages-2.4.51-35.41.1.i586",
"product_id": "apache2-example-pages-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-prefork-2.4.51-35.41.1.i586",
"product_id": "apache2-prefork-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-tls13-2.4.51-35.41.1.i586",
"product_id": "apache2-tls13-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.i586",
"product_id": "apache2-tls13-devel-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-tls13-event-2.4.51-35.41.1.i586",
"product_id": "apache2-tls13-event-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.i586",
"product_id": "apache2-tls13-example-pages-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.i586",
"product_id": "apache2-tls13-prefork-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.i586",
"product_id": "apache2-tls13-utils-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.i586",
"product_id": "apache2-tls13-worker-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-utils-2.4.51-35.41.1.i586",
"product_id": "apache2-utils-2.4.51-35.41.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.41.1.i586",
"product": {
"name": "apache2-worker-2.4.51-35.41.1.i586",
"product_id": "apache2-worker-2.4.51-35.41.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.51-35.41.1.noarch",
"product": {
"name": "apache2-doc-2.4.51-35.41.1.noarch",
"product_id": "apache2-doc-2.4.51-35.41.1.noarch"
}
},
{
"category": "product_version",
"name": "apache2-tls13-doc-2.4.51-35.41.1.noarch",
"product": {
"name": "apache2-tls13-doc-2.4.51-35.41.1.noarch",
"product_id": "apache2-tls13-doc-2.4.51-35.41.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-devel-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-event-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-event-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-example-pages-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-prefork-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-tls13-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-tls13-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-tls13-devel-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-tls13-event-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-tls13-event-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-tls13-prefork-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-tls13-utils-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-tls13-worker-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-utils-2.4.51-35.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.41.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.51-35.41.1.ppc64le",
"product_id": "apache2-worker-2.4.51-35.41.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-2.4.51-35.41.1.s390",
"product_id": "apache2-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-devel-2.4.51-35.41.1.s390",
"product_id": "apache2-devel-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-event-2.4.51-35.41.1.s390",
"product_id": "apache2-event-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-example-pages-2.4.51-35.41.1.s390",
"product_id": "apache2-example-pages-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-prefork-2.4.51-35.41.1.s390",
"product_id": "apache2-prefork-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-tls13-2.4.51-35.41.1.s390",
"product_id": "apache2-tls13-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.s390",
"product_id": "apache2-tls13-devel-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-tls13-event-2.4.51-35.41.1.s390",
"product_id": "apache2-tls13-event-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.s390",
"product_id": "apache2-tls13-example-pages-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.s390",
"product_id": "apache2-tls13-prefork-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.s390",
"product_id": "apache2-tls13-utils-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.s390",
"product_id": "apache2-tls13-worker-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-utils-2.4.51-35.41.1.s390",
"product_id": "apache2-utils-2.4.51-35.41.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.41.1.s390",
"product": {
"name": "apache2-worker-2.4.51-35.41.1.s390",
"product_id": "apache2-worker-2.4.51-35.41.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-2.4.51-35.41.1.s390x",
"product_id": "apache2-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-devel-2.4.51-35.41.1.s390x",
"product_id": "apache2-devel-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-event-2.4.51-35.41.1.s390x",
"product_id": "apache2-event-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.51-35.41.1.s390x",
"product_id": "apache2-example-pages-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-prefork-2.4.51-35.41.1.s390x",
"product_id": "apache2-prefork-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-tls13-2.4.51-35.41.1.s390x",
"product_id": "apache2-tls13-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.s390x",
"product_id": "apache2-tls13-devel-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-tls13-event-2.4.51-35.41.1.s390x",
"product_id": "apache2-tls13-event-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"product_id": "apache2-tls13-example-pages-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"product_id": "apache2-tls13-prefork-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.s390x",
"product_id": "apache2-tls13-utils-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.s390x",
"product_id": "apache2-tls13-worker-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-utils-2.4.51-35.41.1.s390x",
"product_id": "apache2-utils-2.4.51-35.41.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.41.1.s390x",
"product": {
"name": "apache2-worker-2.4.51-35.41.1.s390x",
"product_id": "apache2-worker-2.4.51-35.41.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-2.4.51-35.41.1.x86_64",
"product_id": "apache2-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-devel-2.4.51-35.41.1.x86_64",
"product_id": "apache2-devel-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-event-2.4.51-35.41.1.x86_64",
"product_id": "apache2-event-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.51-35.41.1.x86_64",
"product_id": "apache2-example-pages-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.51-35.41.1.x86_64",
"product_id": "apache2-prefork-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-tls13-2.4.51-35.41.1.x86_64",
"product_id": "apache2-tls13-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.x86_64",
"product_id": "apache2-tls13-devel-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-tls13-event-2.4.51-35.41.1.x86_64",
"product_id": "apache2-tls13-event-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"product_id": "apache2-tls13-example-pages-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"product_id": "apache2-tls13-prefork-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"product_id": "apache2-tls13-utils-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"product_id": "apache2-tls13-worker-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-utils-2.4.51-35.41.1.x86_64",
"product_id": "apache2-utils-2.4.51-35.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.41.1.x86_64",
"product": {
"name": "apache2-worker-2.4.51-35.41.1.x86_64",
"product_id": "apache2-worker-2.4.51-35.41.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-35.41.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-35.41.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-doc-2.4.51-35.41.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch"
},
"product_reference": "apache2-tls13-doc-2.4.51-35.41.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-35.41.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-35.41.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-doc-2.4.51-35.41.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch"
},
"product_reference": "apache2-tls13-doc-2.4.51-35.41.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-35.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-35.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-35.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-35.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38709"
}
],
"notes": [
{
"category": "general",
"text": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38709",
"url": "https://www.suse.com/security/cve/CVE-2023-38709"
},
{
"category": "external",
"summary": "SUSE Bug 1222330 for CVE-2023-38709",
"url": "https://bugzilla.suse.com/1222330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-13T15:14:22Z",
"details": "moderate"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2024-24795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24795"
}
],
"notes": [
{
"category": "general",
"text": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24795",
"url": "https://www.suse.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "SUSE Bug 1222332 for CVE-2024-24795",
"url": "https://bugzilla.suse.com/1222332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-13T15:14:22Z",
"details": "moderate"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-27316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27316"
}
],
"notes": [
{
"category": "general",
"text": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27316",
"url": "https://www.suse.com/security/cve/CVE-2024-27316"
},
{
"category": "external",
"summary": "SUSE Bug 1221401 for CVE-2024-27316",
"url": "https://bugzilla.suse.com/1221401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-doc-2.4.51-35.41.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-example-pages-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-prefork-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-tls13-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.41.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-tls13-devel-2.4.51-35.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-13T15:14:22Z",
"details": "important"
}
],
"title": "CVE-2024-27316"
}
]
}
SUSE-SU-2024:3853-1
Vulnerability from csaf_suse - Published: 2024-10-31 11:01 - Updated: 2024-10-31 11:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for uwsgi",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for uwsgi fixes the following issues:\n\n- CVE-2024-24795: Fixed HTTP Response Splitting in multiple modules (bsc#1222332)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3853,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3853,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3853",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3853-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3853-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243853-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3853-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019744.html"
},
{
"category": "self",
"summary": "SUSE Bug 1222332",
"url": "https://bugzilla.suse.com/1222332"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24795 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24795/"
}
],
"title": "Security update for uwsgi",
"tracking": {
"current_release_date": "2024-10-31T11:01:17Z",
"generator": {
"date": "2024-10-31T11:01:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3853-1",
"initial_release_date": "2024-10-31T11:01:17Z",
"revision_history": [
{
"date": "2024-10-31T11:01:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-gevent-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-jvm-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-ldap-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-libffi-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-lua-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-pam-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-php7-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-psgi-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-pypy-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-python-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-python3-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.aarch64",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.aarch64",
"product_id": "uwsgi-xslt-2.0.19.1-150300.3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.i586",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-gevent-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-jvm-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-ldap-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-libffi-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-lua-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-pam-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-php7-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-psgi-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-pypy-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-python-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-python3-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.i586",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.i586",
"product_id": "uwsgi-xslt-2.0.19.1-150300.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-gevent-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-jvm-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-ldap-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-libffi-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-lua-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-pam-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-php7-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-psgi-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-pypy-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-python3-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.ppc64le",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.ppc64le",
"product_id": "uwsgi-xslt-2.0.19.1-150300.3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.s390x",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-gevent-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-jvm-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-ldap-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-libffi-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-lua-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-pam-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-php7-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-psgi-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-pypy-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-python-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-python3-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.s390x",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.s390x",
"product_id": "uwsgi-xslt-2.0.19.1-150300.3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "apache2-mod_uwsgi-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-emperor_pg-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-emperor_zeromq-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-gevent-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-gevent-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-glusterfs-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-greenlet-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-jvm-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-jvm-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-ldap-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-ldap-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-libffi-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-libffi-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-logzmq-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-lua-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-lua-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-pam-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-pam-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-php7-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-php7-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-psgi-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-psgi-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-pypy-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-pypy-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-python-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-python3-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-python3-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-sqlite3-2.0.19.1-150300.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.x86_64",
"product": {
"name": "uwsgi-xslt-2.0.19.1-150300.3.3.1.x86_64",
"product_id": "uwsgi-xslt-2.0.19.1-150300.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.aarch64"
},
"product_reference": "uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le"
},
"product_reference": "uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.s390x"
},
"product_reference": "uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.x86_64"
},
"product_reference": "uwsgi-python-2.0.19.1-150300.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.aarch64"
},
"product_reference": "uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le"
},
"product_reference": "uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.s390x"
},
"product_reference": "uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uwsgi-python-2.0.19.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.x86_64"
},
"product_reference": "uwsgi-python-2.0.19.1-150300.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-24795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24795"
}
],
"notes": [
{
"category": "general",
"text": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24795",
"url": "https://www.suse.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "SUSE Bug 1222332 for CVE-2024-24795",
"url": "https://bugzilla.suse.com/1222332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:uwsgi-python-2.0.19.1-150300.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:uwsgi-python-2.0.19.1-150300.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-31T11:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2024-24795"
}
]
}
SUSE-SU-2024:1963-1
Vulnerability from csaf_suse - Published: 2024-06-10 11:09 - Updated: 2024-06-10 11:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2023-38709: Fixed HTTP response splitting (bsc#1222330).\n- CVE-2024-24795: Fixed HTTP response splitting in multiple modules (bsc#1222332).\n- CVE-2024-27316: Fixed HTTP/2 CONTINUATION frames can be utilized for DoS attacks (bsc#1221401).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1963,SUSE-SLE-Module-Basesystem-15-SP6-2024-1963,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1963,SUSE-SLE-Module-Server-Applications-15-SP6-2024-1963,openSUSE-SLE-15.6-2024-1963",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1963-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1963-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241963-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1963-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018665.html"
},
{
"category": "self",
"summary": "SUSE Bug 1221401",
"url": "https://bugzilla.suse.com/1221401"
},
{
"category": "self",
"summary": "SUSE Bug 1222330",
"url": "https://bugzilla.suse.com/1222330"
},
{
"category": "self",
"summary": "SUSE Bug 1222332",
"url": "https://bugzilla.suse.com/1222332"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38709 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24795 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27316 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27316/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2024-06-10T11:09:42Z",
"generator": {
"date": "2024-06-10T11:09:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1963-1",
"initial_release_date": "2024-06-10T11:09:42Z",
"revision_history": [
{
"date": "2024-06-10T11:09:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.3.1.aarch64",
"product": {
"name": "apache2-2.4.58-150600.5.3.1.aarch64",
"product_id": "apache2-2.4.58-150600.5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.3.1.aarch64",
"product": {
"name": "apache2-devel-2.4.58-150600.5.3.1.aarch64",
"product_id": "apache2-devel-2.4.58-150600.5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.3.1.aarch64",
"product": {
"name": "apache2-event-2.4.58-150600.5.3.1.aarch64",
"product_id": "apache2-event-2.4.58-150600.5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"product_id": "apache2-prefork-2.4.58-150600.5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.3.1.aarch64",
"product": {
"name": "apache2-utils-2.4.58-150600.5.3.1.aarch64",
"product_id": "apache2-utils-2.4.58-150600.5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.3.1.aarch64",
"product": {
"name": "apache2-worker-2.4.58-150600.5.3.1.aarch64",
"product_id": "apache2-worker-2.4.58-150600.5.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.3.1.i586",
"product": {
"name": "apache2-2.4.58-150600.5.3.1.i586",
"product_id": "apache2-2.4.58-150600.5.3.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.3.1.i586",
"product": {
"name": "apache2-devel-2.4.58-150600.5.3.1.i586",
"product_id": "apache2-devel-2.4.58-150600.5.3.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.3.1.i586",
"product": {
"name": "apache2-event-2.4.58-150600.5.3.1.i586",
"product_id": "apache2-event-2.4.58-150600.5.3.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.3.1.i586",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.i586",
"product_id": "apache2-prefork-2.4.58-150600.5.3.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.3.1.i586",
"product": {
"name": "apache2-utils-2.4.58-150600.5.3.1.i586",
"product_id": "apache2-utils-2.4.58-150600.5.3.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.3.1.i586",
"product": {
"name": "apache2-worker-2.4.58-150600.5.3.1.i586",
"product_id": "apache2-worker-2.4.58-150600.5.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-manual-2.4.58-150600.5.3.1.noarch",
"product": {
"name": "apache2-manual-2.4.58-150600.5.3.1.noarch",
"product_id": "apache2-manual-2.4.58-150600.5.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.3.1.ppc64le",
"product": {
"name": "apache2-2.4.58-150600.5.3.1.ppc64le",
"product_id": "apache2-2.4.58-150600.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"product_id": "apache2-devel-2.4.58-150600.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.3.1.ppc64le",
"product": {
"name": "apache2-event-2.4.58-150600.5.3.1.ppc64le",
"product_id": "apache2-event-2.4.58-150600.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"product_id": "apache2-prefork-2.4.58-150600.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"product_id": "apache2-utils-2.4.58-150600.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"product_id": "apache2-worker-2.4.58-150600.5.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.3.1.s390x",
"product": {
"name": "apache2-2.4.58-150600.5.3.1.s390x",
"product_id": "apache2-2.4.58-150600.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.3.1.s390x",
"product": {
"name": "apache2-devel-2.4.58-150600.5.3.1.s390x",
"product_id": "apache2-devel-2.4.58-150600.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.3.1.s390x",
"product": {
"name": "apache2-event-2.4.58-150600.5.3.1.s390x",
"product_id": "apache2-event-2.4.58-150600.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.3.1.s390x",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.s390x",
"product_id": "apache2-prefork-2.4.58-150600.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.3.1.s390x",
"product": {
"name": "apache2-utils-2.4.58-150600.5.3.1.s390x",
"product_id": "apache2-utils-2.4.58-150600.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.3.1.s390x",
"product": {
"name": "apache2-worker-2.4.58-150600.5.3.1.s390x",
"product_id": "apache2-worker-2.4.58-150600.5.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.58-150600.5.3.1.x86_64",
"product": {
"name": "apache2-2.4.58-150600.5.3.1.x86_64",
"product_id": "apache2-2.4.58-150600.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.58-150600.5.3.1.x86_64",
"product": {
"name": "apache2-devel-2.4.58-150600.5.3.1.x86_64",
"product_id": "apache2-devel-2.4.58-150600.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.58-150600.5.3.1.x86_64",
"product": {
"name": "apache2-event-2.4.58-150600.5.3.1.x86_64",
"product_id": "apache2-event-2.4.58-150600.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"product_id": "apache2-prefork-2.4.58-150600.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.58-150600.5.3.1.x86_64",
"product": {
"name": "apache2-utils-2.4.58-150600.5.3.1.x86_64",
"product_id": "apache2-utils-2.4.58-150600.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.58-150600.5.3.1.x86_64",
"product": {
"name": "apache2-worker-2.4.58-150600.5.3.1.x86_64",
"product_id": "apache2-worker-2.4.58-150600.5.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-event-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-event-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-event-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-event-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-devel-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-utils-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-worker-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.58-150600.5.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-devel-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.58-150600.5.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-devel-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-event-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-event-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-event-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.58-150600.5.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-event-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-manual-2.4.58-150600.5.3.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch"
},
"product_reference": "apache2-manual-2.4.58-150600.5.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.58-150600.5.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-utils-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.58-150600.5.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-utils-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x"
},
"product_reference": "apache2-worker-2.4.58-150600.5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.58-150600.5.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
},
"product_reference": "apache2-worker-2.4.58-150600.5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38709"
}
],
"notes": [
{
"category": "general",
"text": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38709",
"url": "https://www.suse.com/security/cve/CVE-2023-38709"
},
{
"category": "external",
"summary": "SUSE Bug 1222330 for CVE-2023-38709",
"url": "https://bugzilla.suse.com/1222330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-10T11:09:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2024-24795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24795"
}
],
"notes": [
{
"category": "general",
"text": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24795",
"url": "https://www.suse.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "SUSE Bug 1222332 for CVE-2024-24795",
"url": "https://bugzilla.suse.com/1222332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-10T11:09:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-27316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27316"
}
],
"notes": [
{
"category": "general",
"text": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27316",
"url": "https://www.suse.com/security/cve/CVE-2024-27316"
},
{
"category": "external",
"summary": "SUSE Bug 1221401 for CVE-2024-27316",
"url": "https://bugzilla.suse.com/1221401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-worker-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-devel-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-event-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-manual-2.4.58-150600.5.3.1.noarch",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-prefork-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-utils-2.4.58-150600.5.3.1.x86_64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.aarch64",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.ppc64le",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.s390x",
"openSUSE Leap 15.6:apache2-worker-2.4.58-150600.5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-10T11:09:42Z",
"details": "important"
}
],
"title": "CVE-2024-27316"
}
]
}
SUSE-SU-2024:1788-1
Vulnerability from csaf_suse - Published: 2024-05-27 13:27 - Updated: 2024-05-27 13:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2023-38709: Fixed faulty input validation inside the HTTP response splitting code (bsc#1222330).\n- CVE-2024-24795: Fixed handling of malicious HTTP splitting response headers in multiple modules (bsc#1222332).\n- CVE-2024-27316: Fixed HTTP/2 CONTINUATION frames that could have been utilized for DoS attacks (bsc#1221401).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1788,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1788,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1788,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1788,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1788,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1788,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1788,SUSE-Storage-7.1-2024-1788",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1788-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1788-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241788-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1788-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-May/035366.html"
},
{
"category": "self",
"summary": "SUSE Bug 1221401",
"url": "https://bugzilla.suse.com/1221401"
},
{
"category": "self",
"summary": "SUSE Bug 1222330",
"url": "https://bugzilla.suse.com/1222330"
},
{
"category": "self",
"summary": "SUSE Bug 1222332",
"url": "https://bugzilla.suse.com/1222332"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38709 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24795 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27316 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27316/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2024-05-27T13:27:12Z",
"generator": {
"date": "2024-05-27T13:27:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1788-1",
"initial_release_date": "2024-05-27T13:27:12Z",
"revision_history": [
{
"date": "2024-05-27T13:27:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150200.3.62.1.aarch64",
"product": {
"name": "apache2-2.4.51-150200.3.62.1.aarch64",
"product_id": "apache2-2.4.51-150200.3.62.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150200.3.62.1.aarch64",
"product": {
"name": "apache2-devel-2.4.51-150200.3.62.1.aarch64",
"product_id": "apache2-devel-2.4.51-150200.3.62.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150200.3.62.1.aarch64",
"product": {
"name": "apache2-event-2.4.51-150200.3.62.1.aarch64",
"product_id": "apache2-event-2.4.51-150200.3.62.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150200.3.62.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.51-150200.3.62.1.aarch64",
"product_id": "apache2-example-pages-2.4.51-150200.3.62.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"product_id": "apache2-prefork-2.4.51-150200.3.62.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150200.3.62.1.aarch64",
"product": {
"name": "apache2-utils-2.4.51-150200.3.62.1.aarch64",
"product_id": "apache2-utils-2.4.51-150200.3.62.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150200.3.62.1.aarch64",
"product": {
"name": "apache2-worker-2.4.51-150200.3.62.1.aarch64",
"product_id": "apache2-worker-2.4.51-150200.3.62.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150200.3.62.1.i586",
"product": {
"name": "apache2-2.4.51-150200.3.62.1.i586",
"product_id": "apache2-2.4.51-150200.3.62.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150200.3.62.1.i586",
"product": {
"name": "apache2-devel-2.4.51-150200.3.62.1.i586",
"product_id": "apache2-devel-2.4.51-150200.3.62.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150200.3.62.1.i586",
"product": {
"name": "apache2-event-2.4.51-150200.3.62.1.i586",
"product_id": "apache2-event-2.4.51-150200.3.62.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150200.3.62.1.i586",
"product": {
"name": "apache2-example-pages-2.4.51-150200.3.62.1.i586",
"product_id": "apache2-example-pages-2.4.51-150200.3.62.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150200.3.62.1.i586",
"product": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.i586",
"product_id": "apache2-prefork-2.4.51-150200.3.62.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150200.3.62.1.i586",
"product": {
"name": "apache2-utils-2.4.51-150200.3.62.1.i586",
"product_id": "apache2-utils-2.4.51-150200.3.62.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150200.3.62.1.i586",
"product": {
"name": "apache2-worker-2.4.51-150200.3.62.1.i586",
"product_id": "apache2-worker-2.4.51-150200.3.62.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"product": {
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"product_id": "apache2-doc-2.4.51-150200.3.62.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150200.3.62.1.ppc64le",
"product": {
"name": "apache2-2.4.51-150200.3.62.1.ppc64le",
"product_id": "apache2-2.4.51-150200.3.62.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"product_id": "apache2-devel-2.4.51-150200.3.62.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150200.3.62.1.ppc64le",
"product": {
"name": "apache2-event-2.4.51-150200.3.62.1.ppc64le",
"product_id": "apache2-event-2.4.51-150200.3.62.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150200.3.62.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.51-150200.3.62.1.ppc64le",
"product_id": "apache2-example-pages-2.4.51-150200.3.62.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"product_id": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"product_id": "apache2-utils-2.4.51-150200.3.62.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"product_id": "apache2-worker-2.4.51-150200.3.62.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150200.3.62.1.s390x",
"product": {
"name": "apache2-2.4.51-150200.3.62.1.s390x",
"product_id": "apache2-2.4.51-150200.3.62.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150200.3.62.1.s390x",
"product": {
"name": "apache2-devel-2.4.51-150200.3.62.1.s390x",
"product_id": "apache2-devel-2.4.51-150200.3.62.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150200.3.62.1.s390x",
"product": {
"name": "apache2-event-2.4.51-150200.3.62.1.s390x",
"product_id": "apache2-event-2.4.51-150200.3.62.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150200.3.62.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.51-150200.3.62.1.s390x",
"product_id": "apache2-example-pages-2.4.51-150200.3.62.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150200.3.62.1.s390x",
"product": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.s390x",
"product_id": "apache2-prefork-2.4.51-150200.3.62.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150200.3.62.1.s390x",
"product": {
"name": "apache2-utils-2.4.51-150200.3.62.1.s390x",
"product_id": "apache2-utils-2.4.51-150200.3.62.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150200.3.62.1.s390x",
"product": {
"name": "apache2-worker-2.4.51-150200.3.62.1.s390x",
"product_id": "apache2-worker-2.4.51-150200.3.62.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150200.3.62.1.x86_64",
"product": {
"name": "apache2-2.4.51-150200.3.62.1.x86_64",
"product_id": "apache2-2.4.51-150200.3.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"product": {
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"product_id": "apache2-devel-2.4.51-150200.3.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150200.3.62.1.x86_64",
"product": {
"name": "apache2-event-2.4.51-150200.3.62.1.x86_64",
"product_id": "apache2-event-2.4.51-150200.3.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150200.3.62.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.51-150200.3.62.1.x86_64",
"product_id": "apache2-example-pages-2.4.51-150200.3.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"product_id": "apache2-prefork-2.4.51-150200.3.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"product": {
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"product_id": "apache2-utils-2.4.51-150200.3.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"product": {
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"product_id": "apache2-worker-2.4.51-150200.3.62.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150200.3.62.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150200.3.62.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150200.3.62.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150200.3.62.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150200.3.62.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150200.3.62.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150200.3.62.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150200.3.62.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38709"
}
],
"notes": [
{
"category": "general",
"text": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38709",
"url": "https://www.suse.com/security/cve/CVE-2023-38709"
},
{
"category": "external",
"summary": "SUSE Bug 1222330 for CVE-2023-38709",
"url": "https://bugzilla.suse.com/1222330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-27T13:27:12Z",
"details": "moderate"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2024-24795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24795"
}
],
"notes": [
{
"category": "general",
"text": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24795",
"url": "https://www.suse.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "SUSE Bug 1222332 for CVE-2024-24795",
"url": "https://bugzilla.suse.com/1222332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-27T13:27:12Z",
"details": "moderate"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-27316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27316"
}
],
"notes": [
{
"category": "general",
"text": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27316",
"url": "https://www.suse.com/security/cve/CVE-2024-27316"
},
{
"category": "external",
"summary": "SUSE Bug 1221401 for CVE-2024-27316",
"url": "https://bugzilla.suse.com/1221401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache2-worker-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-27T13:27:12Z",
"details": "important"
}
],
"title": "CVE-2024-27316"
}
]
}
SUSE-SU-2024:1868-1
Vulnerability from csaf_suse - Published: 2024-05-30 12:23 - Updated: 2024-05-30 12:23Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2023-38709: Fixed faulty input validation inside the HTTP response splitting code (bsc#1222330).\n- CVE-2024-24795: Fixed handling of malicious HTTP splitting response headers in multiple modules (bsc#1222332).\n- CVE-2024-27316: Fixed HTTP/2 CONTINUATION frames that could have been utilized for DoS attacks (bsc#1221401).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1868,SUSE-SLE-Module-Basesystem-15-SP5-2024-1868,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1868,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1868,SUSE-SLE-Module-Server-Applications-15-SP6-2024-1868,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1868,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1868,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1868,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1868,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1868,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1868,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1868,openSUSE-SLE-15.5-2024-1868",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1868-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1868-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241868-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1868-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019070.html"
},
{
"category": "self",
"summary": "SUSE Bug 1221401",
"url": "https://bugzilla.suse.com/1221401"
},
{
"category": "self",
"summary": "SUSE Bug 1222330",
"url": "https://bugzilla.suse.com/1222330"
},
{
"category": "self",
"summary": "SUSE Bug 1222332",
"url": "https://bugzilla.suse.com/1222332"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38709 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24795 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27316 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27316/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2024-05-30T12:23:10Z",
"generator": {
"date": "2024-05-30T12:23:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1868-1",
"initial_release_date": "2024-05-30T12:23:10Z",
"revision_history": [
{
"date": "2024-05-30T12:23:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.17.1.aarch64",
"product": {
"name": "apache2-2.4.51-150400.6.17.1.aarch64",
"product_id": "apache2-2.4.51-150400.6.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.17.1.aarch64",
"product": {
"name": "apache2-devel-2.4.51-150400.6.17.1.aarch64",
"product_id": "apache2-devel-2.4.51-150400.6.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.17.1.aarch64",
"product": {
"name": "apache2-event-2.4.51-150400.6.17.1.aarch64",
"product_id": "apache2-event-2.4.51-150400.6.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"product_id": "apache2-example-pages-2.4.51-150400.6.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"product_id": "apache2-prefork-2.4.51-150400.6.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.17.1.aarch64",
"product": {
"name": "apache2-utils-2.4.51-150400.6.17.1.aarch64",
"product_id": "apache2-utils-2.4.51-150400.6.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.17.1.aarch64",
"product": {
"name": "apache2-worker-2.4.51-150400.6.17.1.aarch64",
"product_id": "apache2-worker-2.4.51-150400.6.17.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.17.1.i586",
"product": {
"name": "apache2-2.4.51-150400.6.17.1.i586",
"product_id": "apache2-2.4.51-150400.6.17.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.17.1.i586",
"product": {
"name": "apache2-devel-2.4.51-150400.6.17.1.i586",
"product_id": "apache2-devel-2.4.51-150400.6.17.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.17.1.i586",
"product": {
"name": "apache2-event-2.4.51-150400.6.17.1.i586",
"product_id": "apache2-event-2.4.51-150400.6.17.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.17.1.i586",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.i586",
"product_id": "apache2-example-pages-2.4.51-150400.6.17.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.17.1.i586",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.i586",
"product_id": "apache2-prefork-2.4.51-150400.6.17.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.17.1.i586",
"product": {
"name": "apache2-utils-2.4.51-150400.6.17.1.i586",
"product_id": "apache2-utils-2.4.51-150400.6.17.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.17.1.i586",
"product": {
"name": "apache2-worker-2.4.51-150400.6.17.1.i586",
"product_id": "apache2-worker-2.4.51-150400.6.17.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"product": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"product_id": "apache2-doc-2.4.51-150400.6.17.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.17.1.ppc64le",
"product": {
"name": "apache2-2.4.51-150400.6.17.1.ppc64le",
"product_id": "apache2-2.4.51-150400.6.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"product_id": "apache2-devel-2.4.51-150400.6.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.17.1.ppc64le",
"product": {
"name": "apache2-event-2.4.51-150400.6.17.1.ppc64le",
"product_id": "apache2-event-2.4.51-150400.6.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"product_id": "apache2-example-pages-2.4.51-150400.6.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"product_id": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"product_id": "apache2-utils-2.4.51-150400.6.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"product_id": "apache2-worker-2.4.51-150400.6.17.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.17.1.s390x",
"product": {
"name": "apache2-2.4.51-150400.6.17.1.s390x",
"product_id": "apache2-2.4.51-150400.6.17.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.17.1.s390x",
"product": {
"name": "apache2-devel-2.4.51-150400.6.17.1.s390x",
"product_id": "apache2-devel-2.4.51-150400.6.17.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.17.1.s390x",
"product": {
"name": "apache2-event-2.4.51-150400.6.17.1.s390x",
"product_id": "apache2-event-2.4.51-150400.6.17.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"product_id": "apache2-example-pages-2.4.51-150400.6.17.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.17.1.s390x",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.s390x",
"product_id": "apache2-prefork-2.4.51-150400.6.17.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.17.1.s390x",
"product": {
"name": "apache2-utils-2.4.51-150400.6.17.1.s390x",
"product_id": "apache2-utils-2.4.51-150400.6.17.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.17.1.s390x",
"product": {
"name": "apache2-worker-2.4.51-150400.6.17.1.s390x",
"product_id": "apache2-worker-2.4.51-150400.6.17.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-150400.6.17.1.x86_64",
"product": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64",
"product_id": "apache2-2.4.51-150400.6.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"product": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"product_id": "apache2-devel-2.4.51-150400.6.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-150400.6.17.1.x86_64",
"product": {
"name": "apache2-event-2.4.51-150400.6.17.1.x86_64",
"product_id": "apache2-event-2.4.51-150400.6.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"product_id": "apache2-example-pages-2.4.51-150400.6.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"product_id": "apache2-prefork-2.4.51-150400.6.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"product": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"product_id": "apache2-utils-2.4.51-150400.6.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"product": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"product_id": "apache2-worker-2.4.51-150400.6.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-event-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-event-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-event-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-event-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-150400.6.17.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-150400.6.17.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-150400.6.17.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-150400.6.17.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.51-150400.6.17.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-event-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.51-150400.6.17.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-event-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.51-150400.6.17.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-event-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.51-150400.6.17.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-event-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-150400.6.17.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-150400.6.17.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-150400.6.17.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-150400.6.17.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-150400.6.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38709"
}
],
"notes": [
{
"category": "general",
"text": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38709",
"url": "https://www.suse.com/security/cve/CVE-2023-38709"
},
{
"category": "external",
"summary": "SUSE Bug 1222330 for CVE-2023-38709",
"url": "https://bugzilla.suse.com/1222330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-30T12:23:10Z",
"details": "moderate"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2024-24795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24795"
}
],
"notes": [
{
"category": "general",
"text": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24795",
"url": "https://www.suse.com/security/cve/CVE-2024-24795"
},
{
"category": "external",
"summary": "SUSE Bug 1222332 for CVE-2024-24795",
"url": "https://bugzilla.suse.com/1222332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-30T12:23:10Z",
"details": "moderate"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-27316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27316"
}
],
"notes": [
{
"category": "general",
"text": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27316",
"url": "https://www.suse.com/security/cve/CVE-2024-27316"
},
{
"category": "external",
"summary": "SUSE Bug 1221401 for CVE-2024-27316",
"url": "https://bugzilla.suse.com/1221401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Proxy 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Proxy 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-doc-2.4.51-150400.6.17.1.noarch",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.s390x",
"SUSE Manager Server 4.3:apache2-worker-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-devel-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-doc-2.4.51-150400.6.17.1.noarch",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-event-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-example-pages-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-prefork-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-utils-2.4.51-150400.6.17.1.x86_64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.aarch64",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.ppc64le",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.s390x",
"openSUSE Leap 15.5:apache2-worker-2.4.51-150400.6.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-30T12:23:10Z",
"details": "important"
}
],
"title": "CVE-2024-27316"
}
]
}
NCSC-2024-0320
Vulnerability from csaf_ncscnl - Published: 2024-07-30 08:42 - Updated: 2024-07-30 08:42Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft kwetsbaarheden verholpen in MacOS.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een beveiligingsmaatregel te omzeilen, zichzelf verhoogde rechten toe te kennen, toegang te krijgen tot gevoelige gegevens, willekeurige code uit te voeren, mogelijk met kernel-rechten of een Denial-of-Service te veroorzaken.\n\nVoor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide app te installeren en draaien, of een malafide link te volgen.\nVoor het uitvoeren van willekeurige code met kernel-rechten moet de kwaadwillende reeds beschikken over verhoogde rechten op het kwetsbare systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in MacOS 12.7.6, 13.6.8 en 14.6. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Restriction of Rendered UI Layers or Frames",
"title": "CWE-1021"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - apple",
"url": "https://support.apple.com/en-us/HT214118"
},
{
"category": "external",
"summary": "Source - apple",
"url": "https://support.apple.com/en-us/HT214119"
},
{
"category": "external",
"summary": "Source - apple",
"url": "https://support.apple.com/en-us/HT214120"
}
],
"title": "Kwetsbaarheden verholpen in Apple MacOS",
"tracking": {
"current_release_date": "2024-07-30T08:42:07.365674Z",
"id": "NCSC-2024-0320",
"initial_release_date": "2024-07-30T08:42:07.365674Z",
"revision_history": [
{
"date": "2024-07-30T08:42:07.365674Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "macos",
"product": {
"name": "macos",
"product_id": "CSAFPID-2736",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "macos",
"product": {
"name": "macos",
"product_id": "CSAFPID-1513332",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:12.7.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "macos",
"product": {
"name": "macos",
"product_id": "CSAFPID-1513334",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:13.6.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "macos",
"product": {
"name": "macos",
"product_id": "CSAFPID-1513328",
"product_identification_helper": {
"cpe": "cpe:2.3:o:apple:macos:14.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6277",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6277",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6277.json"
}
],
"title": "CVE-2023-6277"
},
{
"cve": "CVE-2023-27952",
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-27952",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27952.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2736"
]
}
],
"title": "CVE-2023-27952"
},
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-52356",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52356.json"
}
],
"title": "CVE-2023-52356"
},
{
"cve": "CVE-2024-2004",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
}
],
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-2379",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2379.json"
}
],
"title": "CVE-2024-2379"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-2466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
}
],
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-4558",
"references": [
{
"category": "self",
"summary": "CVE-2024-4558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4558.json"
}
],
"title": "CVE-2024-4558"
},
{
"cve": "CVE-2024-6387",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json"
}
],
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-23261",
"references": [
{
"category": "self",
"summary": "CVE-2024-23261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23261.json"
}
],
"title": "CVE-2024-23261"
},
{
"cve": "CVE-2024-23296",
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23296",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23296.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2736"
]
}
],
"title": "CVE-2024-23296"
},
{
"cve": "CVE-2024-24795",
"references": [
{
"category": "self",
"summary": "CVE-2024-24795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24795.json"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-27316",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27316",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json"
}
],
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-27826",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27826",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27826.json"
}
],
"title": "CVE-2024-27826"
},
{
"cve": "CVE-2024-27862",
"references": [
{
"category": "self",
"summary": "CVE-2024-27862",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27862.json"
}
],
"title": "CVE-2024-27862"
},
{
"cve": "CVE-2024-27863",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27863.json"
}
],
"title": "CVE-2024-27863"
},
{
"cve": "CVE-2024-27871",
"references": [
{
"category": "self",
"summary": "CVE-2024-27871",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27871.json"
}
],
"title": "CVE-2024-27871"
},
{
"cve": "CVE-2024-27872",
"references": [
{
"category": "self",
"summary": "CVE-2024-27872",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27872.json"
}
],
"title": "CVE-2024-27872"
},
{
"cve": "CVE-2024-27873",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27873",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27873.json"
}
],
"title": "CVE-2024-27873"
},
{
"cve": "CVE-2024-27877",
"references": [
{
"category": "self",
"summary": "CVE-2024-27877",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27877.json"
}
],
"title": "CVE-2024-27877"
},
{
"cve": "CVE-2024-27878",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27878",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27878.json"
}
],
"title": "CVE-2024-27878"
},
{
"cve": "CVE-2024-27881",
"references": [
{
"category": "self",
"summary": "CVE-2024-27881",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27881.json"
}
],
"title": "CVE-2024-27881"
},
{
"cve": "CVE-2024-27882",
"references": [
{
"category": "self",
"summary": "CVE-2024-27882",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27882.json"
}
],
"title": "CVE-2024-27882"
},
{
"cve": "CVE-2024-27883",
"references": [
{
"category": "self",
"summary": "CVE-2024-27883",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27883.json"
}
],
"title": "CVE-2024-27883"
},
{
"cve": "CVE-2024-40774",
"references": [
{
"category": "self",
"summary": "CVE-2024-40774",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40774.json"
}
],
"title": "CVE-2024-40774"
},
{
"cve": "CVE-2024-40775",
"references": [
{
"category": "self",
"summary": "CVE-2024-40775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40775.json"
}
],
"title": "CVE-2024-40775"
},
{
"cve": "CVE-2024-40776",
"references": [
{
"category": "self",
"summary": "CVE-2024-40776",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40776.json"
}
],
"title": "CVE-2024-40776"
},
{
"cve": "CVE-2024-40777",
"references": [
{
"category": "self",
"summary": "CVE-2024-40777",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40777.json"
}
],
"title": "CVE-2024-40777"
},
{
"cve": "CVE-2024-40778",
"references": [
{
"category": "self",
"summary": "CVE-2024-40778",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40778.json"
}
],
"title": "CVE-2024-40778"
},
{
"cve": "CVE-2024-40779",
"references": [
{
"category": "self",
"summary": "CVE-2024-40779",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40779.json"
}
],
"title": "CVE-2024-40779"
},
{
"cve": "CVE-2024-40780",
"references": [
{
"category": "self",
"summary": "CVE-2024-40780",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40780.json"
}
],
"title": "CVE-2024-40780"
},
{
"cve": "CVE-2024-40781",
"references": [
{
"category": "self",
"summary": "CVE-2024-40781",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40781.json"
}
],
"title": "CVE-2024-40781"
},
{
"cve": "CVE-2024-40782",
"references": [
{
"category": "self",
"summary": "CVE-2024-40782",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40782.json"
}
],
"title": "CVE-2024-40782"
},
{
"cve": "CVE-2024-40783",
"references": [
{
"category": "self",
"summary": "CVE-2024-40783",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40783.json"
}
],
"title": "CVE-2024-40783"
},
{
"cve": "CVE-2024-40784",
"references": [
{
"category": "self",
"summary": "CVE-2024-40784",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40784.json"
}
],
"title": "CVE-2024-40784"
},
{
"cve": "CVE-2024-40785",
"references": [
{
"category": "self",
"summary": "CVE-2024-40785",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40785.json"
}
],
"title": "CVE-2024-40785"
},
{
"cve": "CVE-2024-40786",
"references": [
{
"category": "self",
"summary": "CVE-2024-40786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40786.json"
}
],
"title": "CVE-2024-40786"
},
{
"cve": "CVE-2024-40787",
"references": [
{
"category": "self",
"summary": "CVE-2024-40787",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40787.json"
}
],
"title": "CVE-2024-40787"
},
{
"cve": "CVE-2024-40788",
"references": [
{
"category": "self",
"summary": "CVE-2024-40788",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40788.json"
}
],
"title": "CVE-2024-40788"
},
{
"cve": "CVE-2024-40789",
"references": [
{
"category": "self",
"summary": "CVE-2024-40789",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40789.json"
}
],
"title": "CVE-2024-40789"
},
{
"cve": "CVE-2024-40793",
"references": [
{
"category": "self",
"summary": "CVE-2024-40793",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40793.json"
}
],
"title": "CVE-2024-40793"
},
{
"cve": "CVE-2024-40794",
"references": [
{
"category": "self",
"summary": "CVE-2024-40794",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40794.json"
}
],
"title": "CVE-2024-40794"
},
{
"cve": "CVE-2024-40795",
"references": [
{
"category": "self",
"summary": "CVE-2024-40795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40795.json"
}
],
"title": "CVE-2024-40795"
},
{
"cve": "CVE-2024-40796",
"references": [
{
"category": "self",
"summary": "CVE-2024-40796",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40796.json"
}
],
"title": "CVE-2024-40796"
},
{
"cve": "CVE-2024-40798",
"references": [
{
"category": "self",
"summary": "CVE-2024-40798",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40798.json"
}
],
"title": "CVE-2024-40798"
},
{
"cve": "CVE-2024-40799",
"references": [
{
"category": "self",
"summary": "CVE-2024-40799",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40799.json"
}
],
"title": "CVE-2024-40799"
},
{
"cve": "CVE-2024-40800",
"references": [
{
"category": "self",
"summary": "CVE-2024-40800",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40800.json"
}
],
"title": "CVE-2024-40800"
},
{
"cve": "CVE-2024-40802",
"references": [
{
"category": "self",
"summary": "CVE-2024-40802",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40802.json"
}
],
"title": "CVE-2024-40802"
},
{
"cve": "CVE-2024-40803",
"references": [
{
"category": "self",
"summary": "CVE-2024-40803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40803.json"
}
],
"title": "CVE-2024-40803"
},
{
"cve": "CVE-2024-40804",
"references": [
{
"category": "self",
"summary": "CVE-2024-40804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40804.json"
}
],
"title": "CVE-2024-40804"
},
{
"cve": "CVE-2024-40805",
"references": [
{
"category": "self",
"summary": "CVE-2024-40805",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40805.json"
}
],
"title": "CVE-2024-40805"
},
{
"cve": "CVE-2024-40806",
"references": [
{
"category": "self",
"summary": "CVE-2024-40806",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40806.json"
}
],
"title": "CVE-2024-40806"
},
{
"cve": "CVE-2024-40807",
"references": [
{
"category": "self",
"summary": "CVE-2024-40807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40807.json"
}
],
"title": "CVE-2024-40807"
},
{
"cve": "CVE-2024-40809",
"references": [
{
"category": "self",
"summary": "CVE-2024-40809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40809.json"
}
],
"title": "CVE-2024-40809"
},
{
"cve": "CVE-2024-40811",
"references": [
{
"category": "self",
"summary": "CVE-2024-40811",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40811.json"
}
],
"title": "CVE-2024-40811"
},
{
"cve": "CVE-2024-40812",
"references": [
{
"category": "self",
"summary": "CVE-2024-40812",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40812.json"
}
],
"title": "CVE-2024-40812"
},
{
"cve": "CVE-2024-40814",
"references": [
{
"category": "self",
"summary": "CVE-2024-40814",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40814.json"
}
],
"title": "CVE-2024-40814"
},
{
"cve": "CVE-2024-40815",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40815",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40815.json"
}
],
"title": "CVE-2024-40815"
},
{
"cve": "CVE-2024-40816",
"references": [
{
"category": "self",
"summary": "CVE-2024-40816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40816.json"
}
],
"title": "CVE-2024-40816"
},
{
"cve": "CVE-2024-40817",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Rendered UI Layers or Frames",
"title": "CWE-1021"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40817.json"
}
],
"title": "CVE-2024-40817"
},
{
"cve": "CVE-2024-40818",
"references": [
{
"category": "self",
"summary": "CVE-2024-40818",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40818.json"
}
],
"title": "CVE-2024-40818"
},
{
"cve": "CVE-2024-40821",
"references": [
{
"category": "self",
"summary": "CVE-2024-40821",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40821.json"
}
],
"title": "CVE-2024-40821"
},
{
"cve": "CVE-2024-40822",
"references": [
{
"category": "self",
"summary": "CVE-2024-40822",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40822.json"
}
],
"title": "CVE-2024-40822"
},
{
"cve": "CVE-2024-40823",
"references": [
{
"category": "self",
"summary": "CVE-2024-40823",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40823.json"
}
],
"title": "CVE-2024-40823"
},
{
"cve": "CVE-2024-40824",
"references": [
{
"category": "self",
"summary": "CVE-2024-40824",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40824.json"
}
],
"title": "CVE-2024-40824"
},
{
"cve": "CVE-2024-40827",
"references": [
{
"category": "self",
"summary": "CVE-2024-40827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40827.json"
}
],
"title": "CVE-2024-40827"
},
{
"cve": "CVE-2024-40828",
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40828",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40828.json"
}
],
"title": "CVE-2024-40828"
},
{
"cve": "CVE-2024-40829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40829",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40829.json"
}
],
"title": "CVE-2024-40829"
},
{
"cve": "CVE-2024-40832",
"references": [
{
"category": "self",
"summary": "CVE-2024-40832",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40832.json"
}
],
"title": "CVE-2024-40832"
},
{
"cve": "CVE-2024-40833",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40833",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40833.json"
}
],
"title": "CVE-2024-40833"
},
{
"cve": "CVE-2024-40834",
"references": [
{
"category": "self",
"summary": "CVE-2024-40834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40834.json"
}
],
"title": "CVE-2024-40834"
},
{
"cve": "CVE-2024-40835",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40835.json"
}
],
"title": "CVE-2024-40835"
},
{
"cve": "CVE-2024-40836",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40836",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40836.json"
}
],
"title": "CVE-2024-40836"
}
]
}
NCSC-2024-0433
Vulnerability from csaf_ncscnl - Published: 2024-11-12 14:19 - Updated: 2024-11-12 14:19Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDCOM, SCALANCE, SIMATIC en SINEC.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Insufficient Technical Documentation",
"title": "CWE-1059"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Exposure of Sensitive Information Due to Incompatible Policies",
"title": "CWE-213"
},
{
"category": "general",
"text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
"title": "CWE-1268"
},
{
"category": "general",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
},
{
"category": "general",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Interpretation Conflict",
"title": "CWE-436"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-000297.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064257.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-230445.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-331112.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-351178.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-354112.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-454789.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616032.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-654798.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-871035.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-914892.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-915275.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2024-11-12T14:19:20.051128Z",
"id": "NCSC-2024-0433",
"initial_release_date": "2024-11-12T14:19:20.051128Z",
"revision_history": [
{
"date": "2024-11-12T14:19:20.051128Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mendix_runtime_v10.12",
"product": {
"name": "mendix_runtime_v10.12",
"product_id": "CSAFPID-1637623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.12:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v10.6",
"product": {
"name": "mendix_runtime_v10.6",
"product_id": "CSAFPID-1637624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v10",
"product": {
"name": "mendix_runtime_v10",
"product_id": "CSAFPID-1637622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v8",
"product": {
"name": "mendix_runtime_v8",
"product_id": "CSAFPID-1637625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v9",
"product": {
"name": "mendix_runtime_v9",
"product_id": "CSAFPID-1637626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v9:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ozw672",
"product": {
"name": "ozw672",
"product_id": "CSAFPID-1712832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ozw672:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ozw772",
"product": {
"name": "ozw772",
"product_id": "CSAFPID-1712833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ozw772:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
"product_id": "CSAFPID-1712834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_1000_to_5000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
"product_id": "CSAFPID-1712835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_256_to_1000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_32_to_64_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_32_to_64_v3.1",
"product_id": "CSAFPID-1712836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_32_to_64_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_64_to_256_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_64_to_256_v3.1",
"product_id": "CSAFPID-1712837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_64_to_256_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_8_to_32_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_8_to_32_v3.1",
"product_id": "CSAFPID-1712838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_8_to_32_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-1615259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__eu",
"product": {
"name": "ruggedcom_rm1224_lte_4g__eu",
"product_id": "CSAFPID-1702670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__nam",
"product": {
"name": "ruggedcom_rm1224_lte_4g__nam",
"product_id": "CSAFPID-1702671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7-pct",
"product": {
"name": "s7-pct",
"product_id": "CSAFPID-1637909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7-pct:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7-pct",
"product": {
"name": "s7-pct",
"product_id": "CSAFPID-1470060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7-pct:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7_port_configuration_tool",
"product": {
"name": "s7_port_configuration_tool",
"product_id": "CSAFPID-1472074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7_port_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m804pb",
"product": {
"name": "scalance_m804pb",
"product_id": "CSAFPID-1702672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m804pb:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router",
"product": {
"name": "scalance_m812-1_adsl-router",
"product_id": "CSAFPID-1712749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router",
"product": {
"name": "scalance_m816-1_adsl-router",
"product_id": "CSAFPID-1712750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m826-2_shdsl-router",
"product": {
"name": "scalance_m826-2_shdsl-router",
"product_id": "CSAFPID-1702677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-2",
"product": {
"name": "scalance_m874-2",
"product_id": "CSAFPID-1702678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3",
"product": {
"name": "scalance_m874-3",
"product_id": "CSAFPID-1702679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3_3g-router__cn_",
"product": {
"name": "scalance_m874-3_3g-router__cn_",
"product_id": "CSAFPID-1712751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3_3g-router__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3",
"product": {
"name": "scalance_m876-3",
"product_id": "CSAFPID-1712752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__rok_",
"product": {
"name": "scalance_m876-3__rok_",
"product_id": "CSAFPID-1702681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4",
"product": {
"name": "scalance_m876-4",
"product_id": "CSAFPID-1712753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__eu_",
"product": {
"name": "scalance_m876-4__eu_",
"product_id": "CSAFPID-1702682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__nam_",
"product": {
"name": "scalance_m876-4__nam_",
"product_id": "CSAFPID-1702683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__a1_",
"product": {
"name": "scalance_mum853-1__a1_",
"product_id": "CSAFPID-1712754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__b1_",
"product": {
"name": "scalance_mum853-1__b1_",
"product_id": "CSAFPID-1712755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__eu_",
"product": {
"name": "scalance_mum853-1__eu_",
"product_id": "CSAFPID-1712756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__a1_",
"product": {
"name": "scalance_mum856-1__a1_",
"product_id": "CSAFPID-1712757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__b1_",
"product": {
"name": "scalance_mum856-1__b1_",
"product_id": "CSAFPID-1712758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__cn_",
"product": {
"name": "scalance_mum856-1__cn_",
"product_id": "CSAFPID-1712759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__eu_",
"product": {
"name": "scalance_mum856-1__eu_",
"product_id": "CSAFPID-1702684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__row_",
"product": {
"name": "scalance_mum856-1__row_",
"product_id": "CSAFPID-1702685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec_lan-router",
"product": {
"name": "scalance_s615_eec_lan-router",
"product_id": "CSAFPID-1712760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_lan-router",
"product": {
"name": "scalance_s615_lan-router",
"product_id": "CSAFPID-1712761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product": {
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product_id": "CSAFPID-1613504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xch328__6gk5328-4ts01-2ec2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product": {
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product_id": "CSAFPID-1613505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm324__6gk5324-8ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product": {
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product_id": "CSAFPID-1613506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm328__6gk5328-4ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product": {
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product_id": "CSAFPID-1613507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm332__6gk5332-0ga01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product": {
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product_id": "CSAFPID-1613592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product_id": "CSAFPID-1613593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product_id": "CSAFPID-1613594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product_id": "CSAFPID-1613595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product_id": "CSAFPID-1613596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product_id": "CSAFPID-1613597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product_id": "CSAFPID-1613598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool",
"product": {
"name": "security_configuration_tool",
"product_id": "CSAFPID-1625339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool__sct_",
"product": {
"name": "security_configuration_tool__sct_",
"product_id": "CSAFPID-1637910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool__sct_",
"product": {
"name": "security_configuration_tool__sct_",
"product_id": "CSAFPID-1470061",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1472069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1637559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1470062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_batch_v9.1",
"product": {
"name": "simatic_batch_v9.1",
"product_id": "CSAFPID-1625340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_batch_v9.1",
"product": {
"name": "simatic_batch_v9.1",
"product_id": "CSAFPID-1470063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cp_1543-1_v4.0",
"product": {
"name": "simatic_cp_1543-1_v4.0",
"product_id": "CSAFPID-1712748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cp_1543-1_v4.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_family",
"product": {
"name": "simatic_mv500_family",
"product_id": "CSAFPID-1703073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv500_family:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc-software",
"product": {
"name": "simatic_net_pc-software",
"product_id": "CSAFPID-1625344",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc-software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software",
"product": {
"name": "simatic_net_pc_software",
"product_id": "CSAFPID-1470064",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v16",
"product": {
"name": "simatic_net_pc_software_v16",
"product_id": "CSAFPID-1637849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v16",
"product": {
"name": "simatic_net_pc_software_v16",
"product_id": "CSAFPID-1457906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v17",
"product": {
"name": "simatic_net_pc_software_v17",
"product_id": "CSAFPID-1637850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v17",
"product": {
"name": "simatic_net_pc_software_v17",
"product_id": "CSAFPID-1457907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v18",
"product": {
"name": "simatic_net_pc_software_v18",
"product_id": "CSAFPID-1637851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v18",
"product": {
"name": "simatic_net_pc_software_v18",
"product_id": "CSAFPID-1457908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v19",
"product": {
"name": "simatic_net_pc_software_v19",
"product_id": "CSAFPID-1637911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v19",
"product": {
"name": "simatic_net_pc_software_v19",
"product_id": "CSAFPID-1637560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs",
"product": {
"name": "simatic_pcs",
"product_id": "CSAFPID-838530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7_v9.1",
"product": {
"name": "simatic_pcs_7_v9.1",
"product_id": "CSAFPID-1501190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7_v9.1",
"product": {
"name": "simatic_pcs_7_v9.1",
"product_id": "CSAFPID-1457909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1637912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1470065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_",
"product": {
"name": "simatic_route_control_",
"product_id": "CSAFPID-1625337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_v9.1",
"product": {
"name": "simatic_route_control_v9.1",
"product_id": "CSAFPID-1637856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_v9.1",
"product": {
"name": "simatic_route_control_v9.1",
"product_id": "CSAFPID-1470066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager",
"product": {
"name": "simatic_rtls_locating_manager",
"product_id": "CSAFPID-1691398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager:3.0.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product_id": "CSAFPID-1703180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product_id": "CSAFPID-1703181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product_id": "CSAFPID-1703182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product_id": "CSAFPID-1703183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product_id": "CSAFPID-1703184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product_id": "CSAFPID-1703185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product_id": "CSAFPID-1703186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product_id": "CSAFPID-1615260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product_id": "CSAFPID-1615261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product_id": "CSAFPID-1615262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product_id": "CSAFPID-1615263",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product": {
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product_id": "CSAFPID-1703131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v16",
"product": {
"name": "simatic_s7-plcsim_v16",
"product_id": "CSAFPID-1712825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v17",
"product": {
"name": "simatic_s7-plcsim_v17",
"product_id": "CSAFPID-1712826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v16",
"product": {
"name": "simatic_step_7_safety_v16",
"product_id": "CSAFPID-1703190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v17",
"product": {
"name": "simatic_step_7_safety_v17",
"product_id": "CSAFPID-1703191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v18",
"product": {
"name": "simatic_step_7_safety_v18",
"product_id": "CSAFPID-1500667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v16",
"product": {
"name": "simatic_step_7_v16",
"product_id": "CSAFPID-1703187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v17",
"product": {
"name": "simatic_step_7_v17",
"product_id": "CSAFPID-1703188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v18",
"product": {
"name": "simatic_step_7_v18",
"product_id": "CSAFPID-1703189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v5",
"product": {
"name": "simatic_step_7_v5",
"product_id": "CSAFPID-1637913",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v5",
"product": {
"name": "simatic_step_7_v5",
"product_id": "CSAFPID-1457855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-75563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1550826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:8.0:update_5:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.17",
"product": {
"name": "simatic_wincc_oa_v3.17",
"product_id": "CSAFPID-1637914",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.17",
"product": {
"name": "simatic_wincc_oa_v3.17",
"product_id": "CSAFPID-1457956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.18",
"product": {
"name": "simatic_wincc_oa_v3.18",
"product_id": "CSAFPID-1637915",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.18",
"product": {
"name": "simatic_wincc_oa_v3.18",
"product_id": "CSAFPID-1457957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.19",
"product": {
"name": "simatic_wincc_oa_v3.19",
"product_id": "CSAFPID-1637916",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.19",
"product": {
"name": "simatic_wincc_oa_v3.19",
"product_id": "CSAFPID-1457958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-766087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-1470067",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v16",
"product": {
"name": "simatic_wincc_runtime_professional_v16",
"product_id": "CSAFPID-1637917",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v16",
"product": {
"name": "simatic_wincc_runtime_professional_v16",
"product_id": "CSAFPID-1457960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v17",
"product": {
"name": "simatic_wincc_runtime_professional_v17",
"product_id": "CSAFPID-1637887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v17",
"product": {
"name": "simatic_wincc_runtime_professional_v17",
"product_id": "CSAFPID-1457961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v18",
"product": {
"name": "simatic_wincc_runtime_professional_v18",
"product_id": "CSAFPID-1501188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v18",
"product": {
"name": "simatic_wincc_runtime_professional_v18",
"product_id": "CSAFPID-1457962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v19",
"product": {
"name": "simatic_wincc_runtime_professional_v19",
"product_id": "CSAFPID-1501192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v19",
"product": {
"name": "simatic_wincc_runtime_professional_v19",
"product_id": "CSAFPID-1457963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime",
"product": {
"name": "simatic_wincc_unified_pc_runtime",
"product_id": "CSAFPID-744621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime",
"product": {
"name": "simatic_wincc_unified_pc_runtime",
"product_id": "CSAFPID-1470068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v16",
"product": {
"name": "simatic_wincc_unified_v16",
"product_id": "CSAFPID-1703192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v17",
"product": {
"name": "simatic_wincc_unified_v17",
"product_id": "CSAFPID-1703193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v18",
"product": {
"name": "simatic_wincc_unified_v18",
"product_id": "CSAFPID-1703194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v16",
"product": {
"name": "simatic_wincc_v16",
"product_id": "CSAFPID-1702687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v17",
"product": {
"name": "simatic_wincc_v17",
"product_id": "CSAFPID-1702688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v18",
"product": {
"name": "simatic_wincc_v18",
"product_id": "CSAFPID-1703195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.4",
"product": {
"name": "simatic_wincc_v7.4",
"product_id": "CSAFPID-1501193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.4",
"product": {
"name": "simatic_wincc_v7.4",
"product_id": "CSAFPID-1457965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.5",
"product": {
"name": "simatic_wincc_v7.5",
"product_id": "CSAFPID-1501191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.5",
"product": {
"name": "simatic_wincc_v7.5",
"product_id": "CSAFPID-1457966",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v8.0",
"product": {
"name": "simatic_wincc_v8.0",
"product_id": "CSAFPID-1501189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v8.0",
"product": {
"name": "simatic_wincc_v8.0",
"product_id": "CSAFPID-1457967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v16",
"product": {
"name": "simocode_es_v16",
"product_id": "CSAFPID-1702694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v17",
"product": {
"name": "simocode_es_v17",
"product_id": "CSAFPID-1703196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v18",
"product": {
"name": "simocode_es_v18",
"product_id": "CSAFPID-1703197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp1",
"product": {
"name": "simotion_scout_tia_v5.4_sp1",
"product_id": "CSAFPID-1703198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp3",
"product": {
"name": "simotion_scout_tia_v5.4_sp3",
"product_id": "CSAFPID-1703199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.5_sp1",
"product": {
"name": "simotion_scout_tia_v5.5_sp1",
"product_id": "CSAFPID-1703200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.5_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1625341",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1470069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v16",
"product": {
"name": "sinamics_startdrive_v16",
"product_id": "CSAFPID-1703201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v17",
"product": {
"name": "sinamics_startdrive_v17",
"product_id": "CSAFPID-1703202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v18",
"product": {
"name": "sinamics_startdrive_v18",
"product_id": "CSAFPID-1703203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_ins",
"product": {
"name": "sinec_ins",
"product_id": "CSAFPID-746925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_network_management_system",
"product": {
"name": "sinec_network_management_system",
"product_id": "CSAFPID-1691397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_network_management_system:2.0:sp1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-309392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1458012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1693062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:2.0:sp2:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1691473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinema_remote_connect_client",
"product": {
"name": "sinema_remote_connect_client",
"product_id": "CSAFPID-894438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_one_virtual",
"product": {
"name": "sinumerik_one_virtual",
"product_id": "CSAFPID-1625342",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_one_virtual",
"product": {
"name": "sinumerik_one_virtual",
"product_id": "CSAFPID-1470070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_plc_programming_tool",
"product": {
"name": "sinumerik_plc_programming_tool",
"product_id": "CSAFPID-1625338",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_plc_programming_tool",
"product": {
"name": "sinumerik_plc_programming_tool",
"product_id": "CSAFPID-1470071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product_id": "CSAFPID-1615264",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siport",
"product": {
"name": "siport",
"product_id": "CSAFPID-1712847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siport:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v17",
"product": {
"name": "sirius_safety_es_v17",
"product_id": "CSAFPID-1703204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v18",
"product": {
"name": "sirius_safety_es_v18",
"product_id": "CSAFPID-1703205",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v17",
"product": {
"name": "sirius_soft_starter_es_v17",
"product_id": "CSAFPID-1703206",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v18",
"product": {
"name": "sirius_soft_starter_es_v18",
"product_id": "CSAFPID-1703207",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solid_edge_se2024",
"product": {
"name": "solid_edge_se2024",
"product_id": "CSAFPID-1680248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spectrum_power_7",
"product": {
"name": "spectrum_power_7",
"product_id": "CSAFPID-524281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "st7_scadaconnect",
"product": {
"name": "st7_scadaconnect",
"product_id": "CSAFPID-1691077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:st7_scadaconnect:1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
"product": {
"name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
"product_id": "CSAFPID-1703173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:st7_scadaconnect__6nh7997-5da10-0aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic",
"product": {
"name": "telecontrol_server_basic",
"product_id": "CSAFPID-1691051",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic:3.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_1000_v3.1",
"product": {
"name": "telecontrol_server_basic_1000_v3.1",
"product_id": "CSAFPID-1712839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_1000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_256_v3.1",
"product": {
"name": "telecontrol_server_basic_256_v3.1",
"product_id": "CSAFPID-1712840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_256_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_32_v3.1",
"product": {
"name": "telecontrol_server_basic_32_v3.1",
"product_id": "CSAFPID-1712841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_32_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_5000_v3.1",
"product": {
"name": "telecontrol_server_basic_5000_v3.1",
"product_id": "CSAFPID-1712842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_5000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_64_v3.1",
"product": {
"name": "telecontrol_server_basic_64_v3.1",
"product_id": "CSAFPID-1712843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_64_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_8_v3.1",
"product": {
"name": "telecontrol_server_basic_8_v3.1",
"product_id": "CSAFPID-1712844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_8_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_serv_upgr",
"product": {
"name": "telecontrol_server_basic_serv_upgr",
"product_id": "CSAFPID-1712845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_serv_upgr:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_upgr_v3.1",
"product": {
"name": "telecontrol_server_basic_upgr_v3.1",
"product_id": "CSAFPID-1712846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_upgr_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_v3",
"product": {
"name": "telecontrol_server_basic_v3",
"product_id": "CSAFPID-1637855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_connector",
"product": {
"name": "tia_portal_cloud_connector",
"product_id": "CSAFPID-1625345",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_connector",
"product": {
"name": "tia_portal_cloud_connector",
"product_id": "CSAFPID-1470072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v16",
"product": {
"name": "tia_portal_cloud_v16",
"product_id": "CSAFPID-1712827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v17",
"product": {
"name": "tia_portal_cloud_v17",
"product_id": "CSAFPID-1712828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v18",
"product": {
"name": "tia_portal_cloud_v18",
"product_id": "CSAFPID-1712829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-75533",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-1472073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product_id": "CSAFPID-1615531",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product_id": "CSAFPID-1458014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product_id": "CSAFPID-1615256",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product_id": "CSAFPID-1458015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product_id": "CSAFPID-1615257",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product_id": "CSAFPID-1458016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product_id": "CSAFPID-1615258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product_id": "CSAFPID-1458017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product_id": "CSAFPID-1637618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product_id": "CSAFPID-1470073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "wincc",
"product": {
"name": "wincc",
"product_id": "CSAFPID-1625343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "wincc_tia_portal",
"product": {
"name": "wincc_tia_portal",
"product_id": "CSAFPID-465667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500",
"product": {
"name": "simatic_s7-1500",
"product_id": "CSAFPID-715650",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7",
"product": {
"name": "simatic_s7",
"product_id": "CSAFPID-1613729",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:simatic_s7:1500:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
"product": {
"name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
"product_id": "CSAFPID-1691401",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn\\/dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpu_1518f-4_pn__dp_mfp_firmware",
"product": {
"name": "cpu_1518f-4_pn__dp_mfp_firmware",
"product_id": "CSAFPID-715649",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn__dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-880853",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808_firmware",
"product": {
"name": "ruggedcom_ape1808_firmware",
"product_id": "CSAFPID-542833",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool",
"product": {
"name": "security_configuration_tool",
"product_id": "CSAFPID-540747",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7-1500_tm_mfp",
"product_id": "CSAFPID-1693048",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_simatic_s7-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7_-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7_-1500_tm_mfp",
"product_id": "CSAFPID-907212",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_simatic_s7_-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_telecontrol_server_basic",
"product": {
"name": "siemens_telecontrol_server_basic",
"product_id": "CSAFPID-907211",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_telecontrol_server_basic:3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_firmware",
"product": {
"name": "simatic_mv500_firmware",
"product_id": "CSAFPID-1692274",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_mv500_firmware:3.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software",
"product": {
"name": "simatic_net_pc_software",
"product_id": "CSAFPID-1472070",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7",
"product": {
"name": "simatic_pcs_7",
"product_id": "CSAFPID-1472067",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
"product_id": "CSAFPID-1689769",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
"product_id": "CSAFPID-766929",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_firmware",
"product": {
"name": "simatic_s7-1500_tm_mfp_firmware",
"product_id": "CSAFPID-717239",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_firmware",
"product": {
"name": "simatic_s7-1500_tm_mfp_firmware",
"product_id": "CSAFPID-905869",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7",
"product": {
"name": "simatic_step_7",
"product_id": "CSAFPID-879652",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_step_7:5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472068",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472066",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472072",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa",
"product": {
"name": "simatic_wincc_oa",
"product_id": "CSAFPID-1472071",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_oa:3.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-886176",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165976",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165974",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-855582",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-855580",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3506",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3506",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3506.json"
}
],
"title": "CVE-2021-3506"
},
{
"cve": "CVE-2023-2975",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703073",
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1703073",
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-3341",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3341",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3341.json"
}
],
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703073",
"CSAFPID-309392",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-1703173"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703073",
"CSAFPID-309392",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-1703173"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1613729",
"CSAFPID-1703073",
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1613729",
"CSAFPID-1703073",
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4236",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4236.json"
}
],
"title": "CVE-2023-4236"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5517",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5517.json"
}
],
"title": "CVE-2023-5517"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613729",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-309392",
"CSAFPID-1703173",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5679",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5679",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5679.json"
}
],
"title": "CVE-2023-5679"
},
{
"cve": "CVE-2023-5680",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5680",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5680.json"
}
],
"title": "CVE-2023-5680"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6237.json"
}
],
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-6516",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6516",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6516.json"
}
],
"title": "CVE-2023-6516"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1703131"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2023-28450",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613504",
"CSAFPID-1613505",
"CSAFPID-1613506",
"CSAFPID-1613507",
"CSAFPID-1613592",
"CSAFPID-1613593",
"CSAFPID-1613594",
"CSAFPID-1613595",
"CSAFPID-1613596",
"CSAFPID-1613597",
"CSAFPID-1613598"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1613504",
"CSAFPID-1613505",
"CSAFPID-1613506",
"CSAFPID-1613507",
"CSAFPID-1613592",
"CSAFPID-1613593",
"CSAFPID-1613594",
"CSAFPID-1613595",
"CSAFPID-1613596",
"CSAFPID-1613597",
"CSAFPID-1613598"
]
}
],
"title": "CVE-2023-28450"
},
{
"cve": "CVE-2023-30584",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-30584",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-30584.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-30584"
},
{
"cve": "CVE-2023-32002",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
"title": "CWE-1268"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32002",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32002.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32002"
},
{
"cve": "CVE-2023-32003",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32003",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32003.json"
}
],
"title": "CVE-2023-32003"
},
{
"cve": "CVE-2023-32004",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32004"
},
{
"cve": "CVE-2023-32005",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32005",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32005.json"
}
],
"title": "CVE-2023-32005"
},
{
"cve": "CVE-2023-32006",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Exposure of Sensitive Information Due to Incompatible Policies",
"title": "CWE-213"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32006"
},
{
"cve": "CVE-2023-32558",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32558"
},
{
"cve": "CVE-2023-32559",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32559"
},
{
"cve": "CVE-2023-32736",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1703204",
"CSAFPID-1703205",
"CSAFPID-1703206",
"CSAFPID-1703207",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1703204",
"CSAFPID-1703205",
"CSAFPID-1703206",
"CSAFPID-1703207",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829"
]
}
],
"title": "CVE-2023-32736"
},
{
"cve": "CVE-2023-38552",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38552.json"
}
],
"title": "CVE-2023-38552"
},
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-39331",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39331",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39331.json"
}
],
"title": "CVE-2023-39331"
},
{
"cve": "CVE-2023-39332",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39332",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39332.json"
}
],
"title": "CVE-2023-39332"
},
{
"cve": "CVE-2023-39333",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39333",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39333.json"
}
],
"title": "CVE-2023-39333"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-309392",
"CSAFPID-1615259",
"CSAFPID-1703173"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-309392",
"CSAFPID-1615259",
"CSAFPID-1703173"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45143",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-45143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45143.json"
}
],
"title": "CVE-2023-45143"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46280",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1458012",
"CSAFPID-309392",
"CSAFPID-1625338",
"CSAFPID-1625340",
"CSAFPID-1625341",
"CSAFPID-75563",
"CSAFPID-1625342",
"CSAFPID-165765",
"CSAFPID-1625345",
"CSAFPID-766087",
"CSAFPID-1637559",
"CSAFPID-1637560",
"CSAFPID-1637561",
"CSAFPID-1637909",
"CSAFPID-1637910",
"CSAFPID-1637849",
"CSAFPID-1637850",
"CSAFPID-1637851",
"CSAFPID-1637911",
"CSAFPID-1501190",
"CSAFPID-1637912",
"CSAFPID-1637856",
"CSAFPID-1637913",
"CSAFPID-1637914",
"CSAFPID-1637915",
"CSAFPID-1637916",
"CSAFPID-1637917",
"CSAFPID-1637887",
"CSAFPID-1501188",
"CSAFPID-1501192",
"CSAFPID-1637854",
"CSAFPID-1501193",
"CSAFPID-1501191",
"CSAFPID-1501189",
"CSAFPID-1615531",
"CSAFPID-1615256",
"CSAFPID-1615257",
"CSAFPID-1615258",
"CSAFPID-1637618",
"CSAFPID-1470060",
"CSAFPID-1470061",
"CSAFPID-1470062",
"CSAFPID-1470063",
"CSAFPID-1470064",
"CSAFPID-1457909",
"CSAFPID-1470065",
"CSAFPID-1470066",
"CSAFPID-1457855",
"CSAFPID-1457956",
"CSAFPID-1457957",
"CSAFPID-1457958",
"CSAFPID-1470067",
"CSAFPID-1457960",
"CSAFPID-1457961",
"CSAFPID-1457962",
"CSAFPID-1457963",
"CSAFPID-1470068",
"CSAFPID-1457965",
"CSAFPID-1457966",
"CSAFPID-1457967",
"CSAFPID-1470069",
"CSAFPID-1470070",
"CSAFPID-1470071",
"CSAFPID-1470072",
"CSAFPID-1458014",
"CSAFPID-1458015",
"CSAFPID-1458016",
"CSAFPID-1458017",
"CSAFPID-1470073",
"CSAFPID-75533",
"CSAFPID-1472069",
"CSAFPID-1472073",
"CSAFPID-74792",
"CSAFPID-74794",
"CSAFPID-1457906",
"CSAFPID-1457907",
"CSAFPID-1457908"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1458012",
"CSAFPID-309392",
"CSAFPID-1625338",
"CSAFPID-1625340",
"CSAFPID-1625341",
"CSAFPID-75563",
"CSAFPID-1625342",
"CSAFPID-165765",
"CSAFPID-1625345",
"CSAFPID-766087",
"CSAFPID-1637559",
"CSAFPID-1637560",
"CSAFPID-1637561",
"CSAFPID-1637909",
"CSAFPID-1637910",
"CSAFPID-1637849",
"CSAFPID-1637850",
"CSAFPID-1637851",
"CSAFPID-1637911",
"CSAFPID-1501190",
"CSAFPID-1637912",
"CSAFPID-1637856",
"CSAFPID-1637913",
"CSAFPID-1637914",
"CSAFPID-1637915",
"CSAFPID-1637916",
"CSAFPID-1637917",
"CSAFPID-1637887",
"CSAFPID-1501188",
"CSAFPID-1501192",
"CSAFPID-1637854",
"CSAFPID-1501193",
"CSAFPID-1501191",
"CSAFPID-1501189",
"CSAFPID-1615531",
"CSAFPID-1615256",
"CSAFPID-1615257",
"CSAFPID-1615258",
"CSAFPID-1637618",
"CSAFPID-1470060",
"CSAFPID-1470061",
"CSAFPID-1470062",
"CSAFPID-1470063",
"CSAFPID-1470064",
"CSAFPID-1457909",
"CSAFPID-1470065",
"CSAFPID-1470066",
"CSAFPID-1457855",
"CSAFPID-1457956",
"CSAFPID-1457957",
"CSAFPID-1457958",
"CSAFPID-1470067",
"CSAFPID-1457960",
"CSAFPID-1457961",
"CSAFPID-1457962",
"CSAFPID-1457963",
"CSAFPID-1470068",
"CSAFPID-1457965",
"CSAFPID-1457966",
"CSAFPID-1457967",
"CSAFPID-1470069",
"CSAFPID-1470070",
"CSAFPID-1470071",
"CSAFPID-1470072",
"CSAFPID-1458014",
"CSAFPID-1458015",
"CSAFPID-1458016",
"CSAFPID-1458017",
"CSAFPID-1470073",
"CSAFPID-75533",
"CSAFPID-1472069",
"CSAFPID-1472073",
"CSAFPID-74792",
"CSAFPID-74794",
"CSAFPID-1457906",
"CSAFPID-1457907",
"CSAFPID-1457908"
]
}
],
"title": "CVE-2023-46280"
},
{
"cve": "CVE-2023-46809",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-46809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46809.json"
}
],
"title": "CVE-2023-46809"
},
{
"cve": "CVE-2023-47038",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-47038",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47038.json"
}
],
"title": "CVE-2023-47038"
},
{
"cve": "CVE-2023-47039",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-47039",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47039.json"
}
],
"title": "CVE-2023-47039"
},
{
"cve": "CVE-2023-47100",
"references": [
{
"category": "self",
"summary": "CVE-2023-47100",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47100.json"
}
],
"title": "CVE-2023-47100"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615259",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1615259",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49441",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-49441",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49441.json"
}
],
"title": "CVE-2023-49441"
},
{
"cve": "CVE-2023-50387",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50387.json"
}
],
"title": "CVE-2023-50387"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-52389",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52389",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52389.json"
}
],
"title": "CVE-2023-52389"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613729",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1613729",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2004",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Interpretation Conflict",
"title": "CWE-436"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-2379",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2379"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-2466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5594",
"references": [
{
"category": "self",
"summary": "CVE-2024-5594",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5594.json"
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-21890",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Insufficient Technical Documentation",
"title": "CWE-1059"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21890",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21890.json"
}
],
"title": "CVE-2024-21890"
},
{
"cve": "CVE-2024-21891",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21891.json"
}
],
"title": "CVE-2024-21891"
},
{
"cve": "CVE-2024-21892",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21892",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21892.json"
}
],
"title": "CVE-2024-21892"
},
{
"cve": "CVE-2024-21896",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21896.json"
}
],
"title": "CVE-2024-21896"
},
{
"cve": "CVE-2024-22017",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "other",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22017.json"
}
],
"title": "CVE-2024-22017"
},
{
"cve": "CVE-2024-22019",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json"
}
],
"title": "CVE-2024-22019"
},
{
"cve": "CVE-2024-22025",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22025.json"
}
],
"title": "CVE-2024-22025"
},
{
"cve": "CVE-2024-24758",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Policy with Untrusted Domains"
},
"notes": [
{
"category": "other",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24758",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24758.json"
}
],
"title": "CVE-2024-24758"
},
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24795.json"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-24806",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24806",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24806.json"
}
],
"title": "CVE-2024-24806"
},
{
"cve": "CVE-2024-26306",
"cwe": {
"id": "CWE-310",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26306",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26306.json"
}
],
"title": "CVE-2024-26306"
},
{
"cve": "CVE-2024-26925",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26925",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26925.json"
}
],
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-27316",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27316",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json"
}
],
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-27980",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27980",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27980.json"
}
],
"title": "CVE-2024-27980"
},
{
"cve": "CVE-2024-27982",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27982",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27982.json"
}
],
"title": "CVE-2024-27982"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-28882",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28882.json"
}
],
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-29119",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
}
],
"product_status": {
"known_affected": [
"CSAFPID-524281"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-524281"
]
}
],
"title": "CVE-2024-29119"
},
{
"cve": "CVE-2024-36140",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712832",
"CSAFPID-1712833"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36140.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1712832",
"CSAFPID-1712833"
]
}
],
"title": "CVE-2024-36140"
},
{
"cve": "CVE-2024-44102",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712834",
"CSAFPID-1712835",
"CSAFPID-1712836",
"CSAFPID-1712837",
"CSAFPID-1712838",
"CSAFPID-1712839",
"CSAFPID-1712840",
"CSAFPID-1712841",
"CSAFPID-1712842",
"CSAFPID-1712843",
"CSAFPID-1712844",
"CSAFPID-1712845",
"CSAFPID-1712846"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-44102",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44102.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712834",
"CSAFPID-1712835",
"CSAFPID-1712836",
"CSAFPID-1712837",
"CSAFPID-1712838",
"CSAFPID-1712839",
"CSAFPID-1712840",
"CSAFPID-1712841",
"CSAFPID-1712842",
"CSAFPID-1712843",
"CSAFPID-1712844",
"CSAFPID-1712845",
"CSAFPID-1712846"
]
}
],
"title": "CVE-2024-44102"
},
{
"cve": "CVE-2024-46888",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46888",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46888.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46888"
},
{
"cve": "CVE-2024-46889",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46889",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46889"
},
{
"cve": "CVE-2024-46890",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46890",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46890.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46890"
},
{
"cve": "CVE-2024-46891",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46891"
},
{
"cve": "CVE-2024-46892",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "other",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46892",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46892.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46892"
},
{
"cve": "CVE-2024-46894",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46894",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46894.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46894"
},
{
"cve": "CVE-2024-47783",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712847"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47783",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1712847"
]
}
],
"title": "CVE-2024-47783"
},
{
"cve": "CVE-2024-47808",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47808",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47808.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2024-47808"
},
{
"cve": "CVE-2024-47940",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47940",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47940.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47940"
},
{
"cve": "CVE-2024-47941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47941",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47941.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47941"
},
{
"cve": "CVE-2024-47942",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47942",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47942.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47942"
},
{
"cve": "CVE-2024-50310",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712748"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50310",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50310.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712748"
]
}
],
"title": "CVE-2024-50310"
},
{
"cve": "CVE-2024-50313",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637622",
"CSAFPID-1637623",
"CSAFPID-1637624",
"CSAFPID-1637625",
"CSAFPID-1637626"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50313",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50313.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1637622",
"CSAFPID-1637623",
"CSAFPID-1637624",
"CSAFPID-1637625",
"CSAFPID-1637626"
]
}
],
"title": "CVE-2024-50313"
},
{
"cve": "CVE-2024-50557",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50557",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50557.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50557"
},
{
"cve": "CVE-2024-50558",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50558"
},
{
"cve": "CVE-2024-50559",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50559"
},
{
"cve": "CVE-2024-50560",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50560",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50560.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50560"
},
{
"cve": "CVE-2024-50561",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50561"
},
{
"cve": "CVE-2024-50572",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50572",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50572.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50572"
}
]
}
MSRC_CVE-2024-24795
Vulnerability from csaf_microsoft - Published: 2024-04-02 07:00 - Updated: 2024-11-13 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24795 Apache HTTP Server: HTTP Response Splitting in multiple modules - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-24795.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Apache HTTP Server: HTTP Response Splitting in multiple modules",
"tracking": {
"current_release_date": "2024-11-13T00:00:00.000Z",
"generator": {
"date": "2026-01-02T20:07:03.608Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-24795",
"initial_release_date": "2024-04-02T07:00:00.000Z",
"revision_history": [
{
"date": "2024-04-27T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-08-15T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-11-13T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added httpd to CBL-Mariner 2.0\nAdded httpd to Azure Linux 3.0"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 httpd 2.4.59-1",
"product": {
"name": "\u003ccbl2 httpd 2.4.59-1",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "cbl2 httpd 2.4.59-1",
"product": {
"name": "cbl2 httpd 2.4.59-1",
"product_id": "17357"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 httpd 2.4.61-1",
"product": {
"name": "\u003cazl3 httpd 2.4.61-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 httpd 2.4.61-1",
"product": {
"name": "azl3 httpd 2.4.61-1",
"product_id": "17684"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 httpd 2.4.58-4",
"product": {
"name": "\u003cazl3 httpd 2.4.58-4",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 httpd 2.4.58-4",
"product": {
"name": "azl3 httpd 2.4.58-4",
"product_id": "19781"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 httpd 2.4.58-1",
"product": {
"name": "\u003ccbl2 httpd 2.4.58-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 httpd 2.4.58-1",
"product": {
"name": "cbl2 httpd 2.4.58-1",
"product_id": "19953"
}
}
],
"category": "product_name",
"name": "httpd"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 httpd 2.4.59-1 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 httpd 2.4.59-1 as a component of CBL Mariner 2.0",
"product_id": "17357-17086"
},
"product_reference": "17357",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 httpd 2.4.61-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 httpd 2.4.61-1 as a component of Azure Linux 3.0",
"product_id": "17684-17084"
},
"product_reference": "17684",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 httpd 2.4.58-4 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 httpd 2.4.58-4 as a component of Azure Linux 3.0",
"product_id": "19781-17084"
},
"product_reference": "19781",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 httpd 2.4.58-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 httpd 2.4.58-1 as a component of CBL Mariner 2.0",
"product_id": "19953-17086"
},
"product_reference": "19953",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "general",
"text": "apache",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17357-17086",
"17684-17084",
"19781-17084",
"19953-17086"
],
"known_affected": [
"17086-4",
"17084-3",
"17084-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24795 Apache HTTP Server: HTTP Response Splitting in multiple modules - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-24795.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-27T00:00:00.000Z",
"details": "2.4.59-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-4",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-04-27T00:00:00.000Z",
"details": "2.4.61-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.3,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"17086-4",
"17084-3",
"17084-2",
"17086-1"
]
}
],
"title": "Apache HTTP Server: HTTP Response Splitting in multiple modules"
}
]
}
VAR-202404-0121
Vulnerability from variot - Updated: 2025-07-01 21:18HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.
Users are recommended to upgrade to version 2.4.59, which fixes this issue. ========================================================================== Ubuntu Security Notice USN-6729-2 April 17, 2024
apache2 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in Apache HTTP Server.
Software Description: - apache2: Apache HTTP server
Details:
USN-6729-1 fixed several vulnerabilities in Apache. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
Orange Tsai discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2023-38709)
Keran Mu and Jianjun Chen discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2024-24795)
Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module incorrectly handled endless continuation frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. This issue was addressed only in Ubuntu 18.04 LTS. (CVE-2024-27316)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro): apache2 2.4.29-1ubuntu4.27+esm2
Ubuntu 16.04 LTS (Available with Ubuntu Pro): apache2 2.4.18-2ubuntu3.17+esm12
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6729-2 https://ubuntu.com/security/notices/USN-6729-1 CVE-2023-38709, CVE-2024-24795, CVE-2024-27316
.
For the oldstable distribution (bullseye), these problems have been fixed in version 2.4.59-1~deb11u1.
For the stable distribution (bookworm), these problems have been fixed in version 2.4.59-1~deb12u1.
We recommend that you upgrade your apache2 packages. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202409-31
https://security.gentoo.org/
Severity: Low Title: Apache HTTPD: Multiple Vulnerabilities Date: September 28, 2024 Bugs: #928540, #935296, #935427, #936257 ID: 202409-31
Synopsis
Multiple vulnerabilities have been found in Apache HTTPD, the worst of which could result in denial of service.
Affected packages
Package Vulnerable Unaffected
www-servers/apache < 2.4.62 >= 2.4.62
Description
Multiple vulnerabilities have been discovered in Apache HTTPD. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Apache HTTPD users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.62"
References
[ 1 ] CVE-2023-38709 https://nvd.nist.gov/vuln/detail/CVE-2023-38709 [ 2 ] CVE-2024-24795 https://nvd.nist.gov/vuln/detail/CVE-2024-24795 [ 3 ] CVE-2024-27316 https://nvd.nist.gov/vuln/detail/CVE-2024-27316 [ 4 ] CVE-2024-36387 https://nvd.nist.gov/vuln/detail/CVE-2024-36387 [ 5 ] CVE-2024-38472 https://nvd.nist.gov/vuln/detail/CVE-2024-38472 [ 6 ] CVE-2024-38473 https://nvd.nist.gov/vuln/detail/CVE-2024-38473 [ 7 ] CVE-2024-38474 https://nvd.nist.gov/vuln/detail/CVE-2024-38474 [ 8 ] CVE-2024-38475 https://nvd.nist.gov/vuln/detail/CVE-2024-38475 [ 9 ] CVE-2024-38476 https://nvd.nist.gov/vuln/detail/CVE-2024-38476 [ 10 ] CVE-2024-38477 https://nvd.nist.gov/vuln/detail/CVE-2024-38477 [ 11 ] CVE-2024-39573 https://nvd.nist.gov/vuln/detail/CVE-2024-39573 [ 12 ] CVE-2024-39884 https://nvd.nist.gov/vuln/detail/CVE-2024-39884 [ 13 ] CVE-2024-40725 https://nvd.nist.gov/vuln/detail/CVE-2024-40725 [ 14 ] CVE-2024-40898 https://nvd.nist.gov/vuln/detail/CVE-2024-40898
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202409-31
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-07-29-2024-4 macOS Sonoma 14.6
macOS Sonoma 14.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT214119.
Apple maintains a Security Releases page at https://support.apple.com/HT201222 which lists recent software updates with security advisories.
Accounts Available for: macOS Sonoma Impact: A malicious application may be able to access private information Description: The issue was addressed with improved checks. CVE-2024-40804: IES Red Team of ByteDance
apache Available for: macOS Sonoma Impact: Multiple issues in apache Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2023-38709: Yeto CVE-2024-24795: Yeto CVE-2024-27316: Yeto
APFS Available for: macOS Sonoma Impact: A malicious application may be able to bypass Privacy preferences Description: The issue was addressed with improved restriction of data container access. CVE-2024-40783: Csaba Fitzl (@theevilbit) of Kandji
AppleMobileFileIntegrity Available for: macOS Sonoma Impact: An app may be able to bypass Privacy preferences Description: A downgrade issue was addressed with additional code- signing restrictions. CVE-2024-40774: Mickey Jin (@patch1t) CVE-2024-40814: Mickey Jin (@patch1t)
AppleMobileFileIntegrity Available for: macOS Sonoma Impact: An app may be able to leak sensitive user information Description: A downgrade issue was addressed with additional code- signing restrictions. CVE-2024-40775: Mickey Jin (@patch1t)
AppleVA Available for: macOS Sonoma Impact: Processing a maliciously crafted file may lead to unexpected app termination Description: The issue was addressed with improved memory handling. CVE-2024-27877: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative
ASP TCP Available for: macOS Sonoma Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: A buffer overflow issue was addressed with improved memory handling. CVE-2024-27878: CertiK SkyFall Team
CoreGraphics Available for: macOS Sonoma Impact: Processing a maliciously crafted file may lead to unexpected app termination Description: An out-of-bounds read issue was addressed with improved input validation. CVE-2024-40799: D4m0n
CoreMedia Available for: macOS Sonoma Impact: Processing a maliciously crafted video file may lead to unexpected app termination Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2024-27873: Amir Bazine and Karsten König of CrowdStrike Counter Adversary Operations
curl Available for: macOS Sonoma Impact: Multiple issues in curl Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2024-2004 CVE-2024-2379 CVE-2024-2398 CVE-2024-2466
DesktopServices Available for: macOS Sonoma Impact: An app may be able to overwrite arbitrary files Description: The issue was addressed with improved checks. CVE-2024-40827: an anonymous researcher
dyld Available for: macOS Sonoma Impact: A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication Description: A race condition was addressed with additional validation. CVE-2024-40815: w0wbox
Family Sharing Available for: macOS Sonoma Impact: An app may be able to read sensitive location information Description: This issue was addressed with improved data protection. CVE-2024-40795: Csaba Fitzl (@theevilbit) of Kandji
ImageIO Available for: macOS Sonoma Impact: Processing an image may lead to a denial-of-service Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2023-6277 CVE-2023-52356
ImageIO Available for: macOS Sonoma Impact: Processing a maliciously crafted file may lead to unexpected app termination Description: An out-of-bounds read issue was addressed with improved input validation. CVE-2024-40806: Yisumi
ImageIO Available for: macOS Sonoma Impact: Processing a maliciously crafted file may lead to unexpected app termination Description: An out-of-bounds access issue was addressed with improved bounds checking. CVE-2024-40777: Junsung Lee working with Trend Micro Zero Day Initiative, and Amir Bazine and Karsten König of CrowdStrike Counter Adversary Operations
ImageIO Available for: macOS Sonoma Impact: Processing a maliciously crafted file may lead to unexpected app termination Description: An integer overflow was addressed with improved input validation. CVE-2024-40784: Junsung Lee working with Trend Micro Zero Day Initiative, Gandalf4a
Kernel Available for: macOS Sonoma Impact: A local attacker may be able to determine kernel memory layout Description: An information disclosure issue was addressed with improved private data redaction for log entries. CVE-2024-27863: CertiK SkyFall Team
Kernel Available for: macOS Sonoma Impact: A local attacker may be able to cause unexpected system shutdown Description: An out-of-bounds read was addressed with improved input validation. CVE-2024-40816: sqrtpwn
Kernel Available for: macOS Sonoma Impact: A local attacker may be able to cause unexpected system shutdown Description: A type confusion issue was addressed with improved memory handling. CVE-2024-40788: Minghao Lin and Jiaxun Zhu from Zhejiang University
Keychain Access Available for: macOS Sonoma Impact: An attacker may be able to cause unexpected app termination Description: A type confusion issue was addressed with improved checks. CVE-2024-40803: Patrick Wardle of DoubleYou & the Objective-See Foundation
libxpc Available for: macOS Sonoma Impact: An app may be able to bypass Privacy preferences Description: A permissions issue was addressed with additional restrictions. CVE-2024-40805
Messages Available for: macOS Sonoma Impact: An app may be able to view a contact's phone number in system logs Description: The issue was addressed with improved checks. CVE-2024-40832: Rodolphe BRUNETTI (@eisw0lf)
NetworkExtension Available for: macOS Sonoma Impact: Private browsing may leak some browsing history Description: A privacy issue was addressed with improved private data redaction for log entries. CVE-2024-40796: Adam M.
OpenSSH Available for: macOS Sonoma Impact: A remote attacker may be able to cause arbitrary code execution Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2024-6387
PackageKit Available for: macOS Sonoma Impact: A local attacker may be able to elevate their privileges Description: The issue was addressed with improved checks. CVE-2024-40781: Mickey Jin (@patch1t) CVE-2024-40802: Mickey Jin (@patch1t)
PackageKit Available for: macOS Sonoma Impact: An app may be able to access user-sensitive data Description: The issue was addressed with improved checks. CVE-2024-40823: Zhongquan Li (@Guluisacat) from Dawn Security Lab of JingDong
PackageKit Available for: macOS Sonoma Impact: An app may be able to modify protected parts of the file system Description: A permissions issue was addressed with additional restrictions. CVE-2024-27882: Mickey Jin (@patch1t) CVE-2024-27883: Mickey Jin (@patch1t), and Csaba Fitzl (@theevilbit) of Kandji
Photos Storage Available for: macOS Sonoma Impact: Photos in the Hidden Photos Album may be viewed without authentication Description: An authentication issue was addressed with improved state management. CVE-2024-40778: Mateen Alinaghi
Restore Framework Available for: macOS Sonoma Impact: An app may be able to modify protected parts of the file system Description: An input validation issue was addressed with improved input validation. CVE-2024-40800: Claudio Bozzato and Francesco Benvenuto of Cisco Talos
Safari Available for: macOS Sonoma Impact: An app may bypass Gatekeeper checks Description: A race condition was addressed with improved locking. CVE-2023-27952: Csaba Fitzl (@theevilbit) of Offensive Security
Safari Available for: macOS Sonoma Impact: Visiting a website that frames malicious content may lead to UI spoofing Description: The issue was addressed with improved UI handling. CVE-2024-40817: Yadhu Krishna M and Narendra Bhati, Manager of Cyber Security At Suma Soft Pvt. Ltd, Pune (India)
Sandbox Available for: macOS Sonoma Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed through improved state management. CVE-2024-40824: Wojciech Regula of SecuRing (wojciechregula.blog), and Zhongquan Li (@Guluisacat) from Dawn Security Lab of JingDong
Sandbox Available for: macOS Sonoma Impact: An app may be able to access protected user data Description: A path handling issue was addressed with improved validation. CVE-2024-27871: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of Kandji, and Zhongquan Li (@Guluisacat) of Dawn Security Lab of JingDong
Scripting Bridge Available for: macOS Sonoma Impact: An app may be able to access information about a user’s contacts Description: A privacy issue was addressed with improved private data redaction for log entries. CVE-2024-27881: Kirin (@Pwnrin)
Security Available for: macOS Sonoma Impact: Third party app extensions may not receive the correct sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions. CVE-2024-40821: Joshua Jones
Security Available for: macOS Sonoma Impact: An app may be able to read Safari's browsing history Description: This issue was addressed with improved redaction of sensitive information. CVE-2024-40798: Adam M.
Security Initialization Available for: macOS Sonoma Impact: An app may be able to access protected user data Description: This issue was addressed with improved validation of symlinks. CVE-2024-27872: Zhongquan Li (@Guluisacat) of Dawn Security Lab of JingDong
Setup Assistant Available for: macOS Sonoma Impact: Enabling Lockdown Mode while setting up a Mac may cause FileVault to become unexpectedly disabled Description: A logic issue was addressed with improved state management. CVE-2024-27862: Jiwon Park
Shortcuts Available for: macOS Sonoma Impact: A shortcut may be able to use sensitive data with certain actions without prompting the user Description: A logic issue was addressed with improved checks. CVE-2024-40833: an anonymous researcher CVE-2024-40835: an anonymous researcher CVE-2024-40836: an anonymous researcher CVE-2024-40807: an anonymous researcher
Shortcuts Available for: macOS Sonoma Impact: A shortcut may be able to bypass sensitive Shortcuts app settings Description: This issue was addressed by adding an additional prompt for user consent. CVE-2024-40834: Marcio Almeida from Tanto Security
Shortcuts Available for: macOS Sonoma Impact: A shortcut may be able to bypass Internet permission requirements Description: A logic issue was addressed with improved checks. CVE-2024-40809: an anonymous researcher CVE-2024-40812: an anonymous researcher
Shortcuts Available for: macOS Sonoma Impact: A shortcut may be able to bypass Internet permission requirements Description: This issue was addressed by adding an additional prompt for user consent. CVE-2024-40787: an anonymous researcher
Shortcuts Available for: macOS Sonoma Impact: An app may be able to access user-sensitive data Description: This issue was addressed by removing the vulnerable code. CVE-2024-40793: Kirin (@Pwnrin)
Siri Available for: macOS Sonoma Impact: An attacker with physical access may be able to use Siri to access sensitive user data Description: This issue was addressed by restricting options offered on a locked device. CVE-2024-40818: Bistrit Dahal and Srijan Poudel
Siri Available for: macOS Sonoma Impact: An attacker with physical access to a device may be able to access contacts from the lock screen Description: This issue was addressed by restricting options offered on a locked device. CVE-2024-40822: Srijan Poudel
StorageKit Available for: macOS Sonoma Impact: A malicious app may be able to gain root privileges Description: The issue was addressed with improved checks. CVE-2024-40828: Mickey Jin (@patch1t)
sudo Available for: macOS Sonoma Impact: An app may be able to modify protected parts of the file system Description: The issue was addressed with improved checks. CVE-2024-40811: Arsenii Kostromin (0x3c3e)
WebKit Available for: macOS Sonoma Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: A use-after-free issue was addressed with improved memory management. WebKit Bugzilla: 273176 CVE-2024-40776: Huang Xilin of Ant Group Light-Year Security Lab WebKit Bugzilla: 268770 CVE-2024-40782: Maksymilian Motyl
WebKit Available for: macOS Sonoma Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: An out-of-bounds read was addressed with improved bounds checking. WebKit Bugzilla: 275431 CVE-2024-40779: Huang Xilin of Ant Group Light-Year Security Lab WebKit Bugzilla: 275273 CVE-2024-40780: Huang Xilin of Ant Group Light-Year Security Lab
WebKit Available for: macOS Sonoma Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: This issue was addressed with improved checks. WebKit Bugzilla: 273805 CVE-2024-40785: Johan Carlsson (joaxcar)
WebKit Available for: macOS Sonoma Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: An out-of-bounds access issue was addressed with improved bounds checking. CVE-2024-40789: Seunghyun Lee (@0x10n) of KAIST Hacking Lab working with Trend Micro Zero Day Initiative
WebKit Available for: macOS Sonoma Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. WebKit Bugzilla: 274165 CVE-2024-4558
WebKit Available for: macOS Sonoma Impact: Private Browsing tabs may be accessed without authentication Description: This issue was addressed through improved state management. WebKit Bugzilla: 275272 CVE-2024-40794: Matthew Butler
Additional recognition
AirDrop We would like to acknowledge Linwz of DEVCORE for their assistance.
DiskArbitration We would like to acknowledge Yann GASCUEL of Alter Solutions for their assistance.
Image Capture We would like to acknowledge an anonymous researcher for their assistance.
Shortcuts We would like to acknowledge an anonymous researcher for their assistance.
WebKit We would like to acknowledge an anonymous researcher for their assistance.
macOS Sonoma 14.6 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Releases web site: https://support.apple.com/HT201222.
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEsz9altA7uTI+rE/qX+5d1TXaIvoFAmaoH5kACgkQX+5d1TXa IvoS9g/9FoLSV93tVrIOZIM4w/BEZRFu/T1DfMPzOsZsOrvaQicKq7ezW+pRrMXI G0QBIz1QGCYZikcbyQOpgzl9Rk7ckfq+mMCn1ESWku1DbR6MOU7lZEpWRsjYStQY ra6BRT45GPtGG0YFyQXGnxMoS5IXopV5tmgQ4M4585xXso4/Dw192Vq/68NPIB2V ywa6fCo6VC7/hHMe0v5GFVJzmSymEYF3b0CNHZVFx1K793hHrYjH1Dj4NcRlqyln Kp3IrABhPPW8l67gS6f8RicZwzWOH3Ubwv4kivlTtDusqeX+/7mlXrvGTYd5G39P 70jSwUeekfYkQYGT5yLjFCOTM98ApG4iHnryEkpNldMk9JRozoN3VT5PDv6b7EtR YsG1UiZNn0rq1TurFHdsX7G8LZX1jBe1XNy883FeuPlXuPQwGcds+Q5UpiGoM5Kj xx0SGiaK4Lg9tOsGDvHDvrtgl9vIGYy07953Gre+xUhdNs+AnG8KhwKs+n3WYjcL lH3ffMkq/NTVohaNaIcNk4YQ7Y5+y9Y0Z2YuYTmaOipxMNEpOnvJj6LB1H5Qgj4M LIuUxs1gl2b7B93J95w8FmdFewvUCgcZwTxU2ltsYAcZHnRwWE0twYP5v1Pc8tOG MZuvS0pTI+hgve1viS0inOnRpoYv+KzkaSYEhvsS16NgDuRUOqE= =eOPj -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202404-0121",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "38"
},
{
"model": "ontap tools",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": "10"
},
{
"model": "http server",
"scope": "lt",
"trust": 1.0,
"vendor": "apache",
"version": "2.4.59"
},
{
"model": "fabric operating system",
"scope": "eq",
"trust": 1.0,
"vendor": "broadcom",
"version": null
},
{
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "40"
},
{
"model": "macos",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "14.6"
},
{
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "39"
},
{
"model": "http server",
"scope": "gte",
"trust": 1.0,
"vendor": "apache",
"version": "2.4.0"
},
{
"model": "ontap",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": "9"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "10.0"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2024-24795"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ubuntu",
"sources": [
{
"db": "PACKETSTORM",
"id": "178035"
},
{
"db": "PACKETSTORM",
"id": "178131"
},
{
"db": "PACKETSTORM",
"id": "178298"
}
],
"trust": 0.3
},
"cve": "CVE-2024-24795",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2024-24795",
"impactScore": 3.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-24795",
"trust": 1.0,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2024-24795"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. \n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue. ==========================================================================\nUbuntu Security Notice USN-6729-2\nApril 17, 2024\n\napache2 vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS (Available with Ubuntu Pro)\n- Ubuntu 16.04 LTS (Available with Ubuntu Pro)\n\nSummary:\n\nSeveral security issues were fixed in Apache HTTP Server. \n\nSoftware Description:\n- apache2: Apache HTTP server\n\nDetails:\n\nUSN-6729-1 fixed several vulnerabilities in Apache. This update provides\nthe corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. \n\nOriginal advisory details:\n\n Orange Tsai discovered that the Apache HTTP Server incorrectly handled\n validating certain input. A remote attacker could possibly use this\n issue to perform HTTP request splitting attacks. (CVE-2023-38709)\n\n Keran Mu and Jianjun Chen discovered that the Apache HTTP Server\n incorrectly handled validating certain input. A remote attacker could\n possibly use this issue to perform HTTP request splitting attacks. \n (CVE-2024-24795)\n\n Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module\n incorrectly handled endless continuation frames. A remote attacker could\n possibly use this issue to cause the server to consume resources, leading\n to a denial of service. This issue was addressed only in Ubuntu 18.04 LTS. \n (CVE-2024-27316)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS (Available with Ubuntu Pro):\n apache2 2.4.29-1ubuntu4.27+esm2\n\nUbuntu 16.04 LTS (Available with Ubuntu Pro):\n apache2 2.4.18-2ubuntu3.17+esm12\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://ubuntu.com/security/notices/USN-6729-2\n https://ubuntu.com/security/notices/USN-6729-1\n CVE-2023-38709, CVE-2024-24795, CVE-2024-27316\n\n. \n\nFor the oldstable distribution (bullseye), these problems have been fixed\nin version 2.4.59-1~deb11u1. \n\nFor the stable distribution (bookworm), these problems have been fixed in\nversion 2.4.59-1~deb12u1. \n\nWe recommend that you upgrade your apache2 packages. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202409-31\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Low\n Title: Apache HTTPD: Multiple Vulnerabilities\n Date: September 28, 2024\n Bugs: #928540, #935296, #935427, #936257\n ID: 202409-31\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Apache HTTPD, the worst of\nwhich could result in denial of service. \n\nAffected packages\n=================\n\nPackage Vulnerable Unaffected\n------------------ ------------ ------------\nwww-servers/apache \u003c 2.4.62 \u003e= 2.4.62\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Apache HTTPD. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Apache HTTPD users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-servers/apache-2.4.62\"\n\nReferences\n==========\n\n[ 1 ] CVE-2023-38709\n https://nvd.nist.gov/vuln/detail/CVE-2023-38709\n[ 2 ] CVE-2024-24795\n https://nvd.nist.gov/vuln/detail/CVE-2024-24795\n[ 3 ] CVE-2024-27316\n https://nvd.nist.gov/vuln/detail/CVE-2024-27316\n[ 4 ] CVE-2024-36387\n https://nvd.nist.gov/vuln/detail/CVE-2024-36387\n[ 5 ] CVE-2024-38472\n https://nvd.nist.gov/vuln/detail/CVE-2024-38472\n[ 6 ] CVE-2024-38473\n https://nvd.nist.gov/vuln/detail/CVE-2024-38473\n[ 7 ] CVE-2024-38474\n https://nvd.nist.gov/vuln/detail/CVE-2024-38474\n[ 8 ] CVE-2024-38475\n https://nvd.nist.gov/vuln/detail/CVE-2024-38475\n[ 9 ] CVE-2024-38476\n https://nvd.nist.gov/vuln/detail/CVE-2024-38476\n[ 10 ] CVE-2024-38477\n https://nvd.nist.gov/vuln/detail/CVE-2024-38477\n[ 11 ] CVE-2024-39573\n https://nvd.nist.gov/vuln/detail/CVE-2024-39573\n[ 12 ] CVE-2024-39884\n https://nvd.nist.gov/vuln/detail/CVE-2024-39884\n[ 13 ] CVE-2024-40725\n https://nvd.nist.gov/vuln/detail/CVE-2024-40725\n[ 14 ] CVE-2024-40898\n https://nvd.nist.gov/vuln/detail/CVE-2024-40898\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202409-31\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2024 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-07-29-2024-4 macOS Sonoma 14.6\n\nmacOS Sonoma 14.6 addresses the following issues. \nInformation about the security content is also available at\nhttps://support.apple.com/HT214119. \n\nApple maintains a Security Releases page at\nhttps://support.apple.com/HT201222 which lists recent\nsoftware updates with security advisories. \n\nAccounts\nAvailable for: macOS Sonoma\nImpact: A malicious application may be able to access private\ninformation\nDescription: The issue was addressed with improved checks. \nCVE-2024-40804: IES Red Team of ByteDance\n\napache\nAvailable for: macOS Sonoma\nImpact: Multiple issues in apache\nDescription: This is a vulnerability in open source code and Apple\nSoftware is among the affected projects. The CVE-ID was assigned by a\nthird party. Learn more about the issue and CVE-ID at cve.org. \nCVE-2023-38709: Yeto\nCVE-2024-24795: Yeto\nCVE-2024-27316: Yeto\n\nAPFS\nAvailable for: macOS Sonoma\nImpact: A malicious application may be able to bypass Privacy\npreferences\nDescription: The issue was addressed with improved restriction of data\ncontainer access. \nCVE-2024-40783: Csaba Fitzl (@theevilbit) of Kandji\n\nAppleMobileFileIntegrity\nAvailable for: macOS Sonoma\nImpact: An app may be able to bypass Privacy preferences\nDescription: A downgrade issue was addressed with additional code-\nsigning restrictions. \nCVE-2024-40774: Mickey Jin (@patch1t)\nCVE-2024-40814: Mickey Jin (@patch1t)\n\nAppleMobileFileIntegrity\nAvailable for: macOS Sonoma\nImpact: An app may be able to leak sensitive user information\nDescription: A downgrade issue was addressed with additional code-\nsigning restrictions. \nCVE-2024-40775: Mickey Jin (@patch1t)\n\nAppleVA\nAvailable for: macOS Sonoma\nImpact: Processing a maliciously crafted file may lead to unexpected app\ntermination\nDescription: The issue was addressed with improved memory handling. \nCVE-2024-27877: Michael DePlante (@izobashi) of Trend Micro Zero Day\nInitiative\n\nASP TCP\nAvailable for: macOS Sonoma\nImpact: An app with root privileges may be able to execute arbitrary\ncode with kernel privileges\nDescription: A buffer overflow issue was addressed with improved memory\nhandling. \nCVE-2024-27878: CertiK SkyFall Team\n\nCoreGraphics\nAvailable for: macOS Sonoma\nImpact: Processing a maliciously crafted file may lead to unexpected app\ntermination\nDescription: An out-of-bounds read issue was addressed with improved\ninput validation. \nCVE-2024-40799: D4m0n\n\nCoreMedia\nAvailable for: macOS Sonoma\nImpact: Processing a maliciously crafted video file may lead to\nunexpected app termination\nDescription: An out-of-bounds write issue was addressed with improved\ninput validation. \nCVE-2024-27873: Amir Bazine and Karsten K\u00f6nig of CrowdStrike Counter\nAdversary Operations\n\ncurl\nAvailable for: macOS Sonoma\nImpact: Multiple issues in curl\nDescription: This is a vulnerability in open source code and Apple\nSoftware is among the affected projects. The CVE-ID was assigned by a\nthird party. Learn more about the issue and CVE-ID at cve.org. \nCVE-2024-2004\nCVE-2024-2379\nCVE-2024-2398\nCVE-2024-2466\n\nDesktopServices\nAvailable for: macOS Sonoma\nImpact: An app may be able to overwrite arbitrary files\nDescription: The issue was addressed with improved checks. \nCVE-2024-40827: an anonymous researcher\n\ndyld\nAvailable for: macOS Sonoma\nImpact: A malicious attacker with arbitrary read and write capability\nmay be able to bypass Pointer Authentication\nDescription: A race condition was addressed with additional validation. \nCVE-2024-40815: w0wbox\n\nFamily Sharing\nAvailable for: macOS Sonoma\nImpact: An app may be able to read sensitive location information\nDescription: This issue was addressed with improved data protection. \nCVE-2024-40795: Csaba Fitzl (@theevilbit) of Kandji\n\nImageIO\nAvailable for: macOS Sonoma\nImpact: Processing an image may lead to a denial-of-service\nDescription: This is a vulnerability in open source code and Apple\nSoftware is among the affected projects. The CVE-ID was assigned by a\nthird party. Learn more about the issue and CVE-ID at cve.org. \nCVE-2023-6277\nCVE-2023-52356\n\nImageIO\nAvailable for: macOS Sonoma\nImpact: Processing a maliciously crafted file may lead to unexpected app\ntermination\nDescription: An out-of-bounds read issue was addressed with improved\ninput validation. \nCVE-2024-40806: Yisumi\n\nImageIO\nAvailable for: macOS Sonoma\nImpact: Processing a maliciously crafted file may lead to unexpected app\ntermination\nDescription: An out-of-bounds access issue was addressed with improved\nbounds checking. \nCVE-2024-40777: Junsung Lee working with Trend Micro Zero Day\nInitiative, and Amir Bazine and Karsten K\u00f6nig of CrowdStrike Counter\nAdversary Operations\n\nImageIO\nAvailable for: macOS Sonoma\nImpact: Processing a maliciously crafted file may lead to unexpected app\ntermination\nDescription: An integer overflow was addressed with improved input\nvalidation. \nCVE-2024-40784: Junsung Lee working with Trend Micro Zero Day\nInitiative, Gandalf4a\n\nKernel\nAvailable for: macOS Sonoma\nImpact: A local attacker may be able to determine kernel memory layout\nDescription: An information disclosure issue was addressed with improved\nprivate data redaction for log entries. \nCVE-2024-27863: CertiK SkyFall Team\n\nKernel\nAvailable for: macOS Sonoma\nImpact: A local attacker may be able to cause unexpected system shutdown\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2024-40816: sqrtpwn\n\nKernel\nAvailable for: macOS Sonoma\nImpact: A local attacker may be able to cause unexpected system shutdown\nDescription: A type confusion issue was addressed with improved memory\nhandling. \nCVE-2024-40788: Minghao Lin and Jiaxun Zhu from Zhejiang University\n\nKeychain Access\nAvailable for: macOS Sonoma\nImpact: An attacker may be able to cause unexpected app termination\nDescription: A type confusion issue was addressed with improved checks. \nCVE-2024-40803: Patrick Wardle of DoubleYou \u0026 the Objective-See\nFoundation\n\nlibxpc\nAvailable for: macOS Sonoma\nImpact: An app may be able to bypass Privacy preferences\nDescription: A permissions issue was addressed with additional\nrestrictions. \nCVE-2024-40805\n\nMessages\nAvailable for: macOS Sonoma\nImpact: An app may be able to view a contact\u0027s phone number in system\nlogs\nDescription: The issue was addressed with improved checks. \nCVE-2024-40832: Rodolphe BRUNETTI (@eisw0lf)\n\nNetworkExtension\nAvailable for: macOS Sonoma\nImpact: Private browsing may leak some browsing history\nDescription: A privacy issue was addressed with improved private data\nredaction for log entries. \nCVE-2024-40796: Adam M. \n\nOpenSSH\nAvailable for: macOS Sonoma\nImpact: A remote attacker may be able to cause arbitrary code execution\nDescription: This is a vulnerability in open source code and Apple\nSoftware is among the affected projects. The CVE-ID was assigned by a\nthird party. Learn more about the issue and CVE-ID at cve.org. \nCVE-2024-6387\n\nPackageKit\nAvailable for: macOS Sonoma\nImpact: A local attacker may be able to elevate their privileges\nDescription: The issue was addressed with improved checks. \nCVE-2024-40781: Mickey Jin (@patch1t)\nCVE-2024-40802: Mickey Jin (@patch1t)\n\nPackageKit\nAvailable for: macOS Sonoma\nImpact: An app may be able to access user-sensitive data\nDescription: The issue was addressed with improved checks. \nCVE-2024-40823: Zhongquan Li (@Guluisacat) from Dawn Security Lab of\nJingDong\n\nPackageKit\nAvailable for: macOS Sonoma\nImpact: An app may be able to modify protected parts of the file system\nDescription: A permissions issue was addressed with additional\nrestrictions. \nCVE-2024-27882: Mickey Jin (@patch1t)\nCVE-2024-27883: Mickey Jin (@patch1t), and Csaba Fitzl (@theevilbit) of\nKandji\n\nPhotos Storage\nAvailable for: macOS Sonoma\nImpact: Photos in the Hidden Photos Album may be viewed without\nauthentication\nDescription: An authentication issue was addressed with improved state\nmanagement. \nCVE-2024-40778: Mateen Alinaghi\n\nRestore Framework\nAvailable for: macOS Sonoma\nImpact: An app may be able to modify protected parts of the file system\nDescription: An input validation issue was addressed with improved input\nvalidation. \nCVE-2024-40800: Claudio Bozzato and Francesco Benvenuto of Cisco Talos\n\nSafari\nAvailable for: macOS Sonoma\nImpact: An app may bypass Gatekeeper checks\nDescription: A race condition was addressed with improved locking. \nCVE-2023-27952: Csaba Fitzl (@theevilbit) of Offensive Security\n\nSafari\nAvailable for: macOS Sonoma\nImpact: Visiting a website that frames malicious content may lead to UI\nspoofing\nDescription: The issue was addressed with improved UI handling. \nCVE-2024-40817: Yadhu Krishna M and Narendra Bhati, Manager of Cyber\nSecurity At Suma Soft Pvt. Ltd, Pune (India)\n\nSandbox\nAvailable for: macOS Sonoma\nImpact: An app may be able to bypass Privacy preferences\nDescription: This issue was addressed through improved state management. \nCVE-2024-40824: Wojciech Regula of SecuRing (wojciechregula.blog), and\nZhongquan Li (@Guluisacat) from Dawn Security Lab of JingDong\n\nSandbox\nAvailable for: macOS Sonoma\nImpact: An app may be able to access protected user data\nDescription: A path handling issue was addressed with improved\nvalidation. \nCVE-2024-27871: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of\nKandji, and Zhongquan Li (@Guluisacat) of Dawn Security Lab of JingDong\n\nScripting Bridge\nAvailable for: macOS Sonoma\nImpact: An app may be able to access information about a user\u2019s contacts\nDescription: A privacy issue was addressed with improved private data\nredaction for log entries. \nCVE-2024-27881: Kirin (@Pwnrin)\n\nSecurity\nAvailable for: macOS Sonoma\nImpact: Third party app extensions may not receive the correct sandbox\nrestrictions\nDescription: An access issue was addressed with additional sandbox\nrestrictions. \nCVE-2024-40821: Joshua Jones\n\nSecurity\nAvailable for: macOS Sonoma\nImpact: An app may be able to read Safari\u0027s browsing history\nDescription: This issue was addressed with improved redaction of\nsensitive information. \nCVE-2024-40798: Adam M. \n\nSecurity Initialization\nAvailable for: macOS Sonoma\nImpact: An app may be able to access protected user data\nDescription: This issue was addressed with improved validation of\nsymlinks. \nCVE-2024-27872: Zhongquan Li (@Guluisacat) of Dawn Security Lab of\nJingDong\n\nSetup Assistant\nAvailable for: macOS Sonoma\nImpact: Enabling Lockdown Mode while setting up a Mac may cause\nFileVault to become unexpectedly disabled\nDescription: A logic issue was addressed with improved state management. \nCVE-2024-27862: Jiwon Park\n\nShortcuts\nAvailable for: macOS Sonoma\nImpact: A shortcut may be able to use sensitive data with certain\nactions without prompting the user\nDescription: A logic issue was addressed with improved checks. \nCVE-2024-40833: an anonymous researcher\nCVE-2024-40835: an anonymous researcher\nCVE-2024-40836: an anonymous researcher\nCVE-2024-40807: an anonymous researcher\n\nShortcuts\nAvailable for: macOS Sonoma\nImpact: A shortcut may be able to bypass sensitive Shortcuts app\nsettings\nDescription: This issue was addressed by adding an additional prompt for\nuser consent. \nCVE-2024-40834: Marcio Almeida from Tanto Security\n\nShortcuts\nAvailable for: macOS Sonoma\nImpact: A shortcut may be able to bypass Internet permission\nrequirements\nDescription: A logic issue was addressed with improved checks. \nCVE-2024-40809: an anonymous researcher\nCVE-2024-40812: an anonymous researcher\n\nShortcuts\nAvailable for: macOS Sonoma\nImpact: A shortcut may be able to bypass Internet permission\nrequirements\nDescription: This issue was addressed by adding an additional prompt for\nuser consent. \nCVE-2024-40787: an anonymous researcher\n\nShortcuts\nAvailable for: macOS Sonoma\nImpact: An app may be able to access user-sensitive data\nDescription: This issue was addressed by removing the vulnerable code. \nCVE-2024-40793: Kirin (@Pwnrin)\n\nSiri\nAvailable for: macOS Sonoma\nImpact: An attacker with physical access may be able to use Siri to\naccess sensitive user data\nDescription: This issue was addressed by restricting options offered on\na locked device. \nCVE-2024-40818: Bistrit Dahal and Srijan Poudel\n\nSiri\nAvailable for: macOS Sonoma\nImpact: An attacker with physical access to a device may be able to\naccess contacts from the lock screen\nDescription: This issue was addressed by restricting options offered on\na locked device. \nCVE-2024-40822: Srijan Poudel\n\nStorageKit\nAvailable for: macOS Sonoma\nImpact: A malicious app may be able to gain root privileges\nDescription: The issue was addressed with improved checks. \nCVE-2024-40828: Mickey Jin (@patch1t)\n\nsudo\nAvailable for: macOS Sonoma\nImpact: An app may be able to modify protected parts of the file system\nDescription: The issue was addressed with improved checks. \nCVE-2024-40811: Arsenii Kostromin (0x3c3e)\n\nWebKit\nAvailable for: macOS Sonoma\nImpact: Processing maliciously crafted web content may lead to an\nunexpected process crash\nDescription: A use-after-free issue was addressed with improved memory\nmanagement. \nWebKit Bugzilla: 273176\nCVE-2024-40776: Huang Xilin of Ant Group Light-Year Security Lab\nWebKit Bugzilla: 268770\nCVE-2024-40782: Maksymilian Motyl\n\nWebKit\nAvailable for: macOS Sonoma\nImpact: Processing maliciously crafted web content may lead to an\nunexpected process crash\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nWebKit Bugzilla: 275431\nCVE-2024-40779: Huang Xilin of Ant Group Light-Year Security Lab\nWebKit Bugzilla: 275273\nCVE-2024-40780: Huang Xilin of Ant Group Light-Year Security Lab\n\nWebKit\nAvailable for: macOS Sonoma\nImpact: Processing maliciously crafted web content may lead to a cross\nsite scripting attack\nDescription: This issue was addressed with improved checks. \nWebKit Bugzilla: 273805\nCVE-2024-40785: Johan Carlsson (joaxcar)\n\nWebKit\nAvailable for: macOS Sonoma\nImpact: Processing maliciously crafted web content may lead to an\nunexpected process crash\nDescription: An out-of-bounds access issue was addressed with improved\nbounds checking. \nCVE-2024-40789: Seunghyun Lee (@0x10n) of KAIST Hacking Lab working with\nTrend Micro Zero Day Initiative\n\nWebKit\nAvailable for: macOS Sonoma\nImpact: Processing maliciously crafted web content may lead to an\nunexpected process crash\nDescription: This is a vulnerability in open source code and Apple\nSoftware is among the affected projects. The CVE-ID was assigned by a\nthird party. Learn more about the issue and CVE-ID at cve.org. \nWebKit Bugzilla: 274165\nCVE-2024-4558\n\nWebKit\nAvailable for: macOS Sonoma\nImpact: Private Browsing tabs may be accessed without authentication\nDescription: This issue was addressed through improved state management. \nWebKit Bugzilla: 275272\nCVE-2024-40794: Matthew Butler\n\nAdditional recognition\n\nAirDrop\nWe would like to acknowledge Linwz of DEVCORE for their assistance. \n\nDiskArbitration\nWe would like to acknowledge Yann GASCUEL of Alter Solutions for their\nassistance. \n\nImage Capture\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nShortcuts\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nWebKit\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nmacOS Sonoma 14.6 may be obtained from the Mac App Store or Apple\u0027s\nSoftware Downloads web site: https://support.apple.com/downloads/\nAll information is also posted on the Apple Security Releases\nweb site: https://support.apple.com/HT201222. \n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n\niQIzBAEBCAAdFiEEsz9altA7uTI+rE/qX+5d1TXaIvoFAmaoH5kACgkQX+5d1TXa\nIvoS9g/9FoLSV93tVrIOZIM4w/BEZRFu/T1DfMPzOsZsOrvaQicKq7ezW+pRrMXI\nG0QBIz1QGCYZikcbyQOpgzl9Rk7ckfq+mMCn1ESWku1DbR6MOU7lZEpWRsjYStQY\nra6BRT45GPtGG0YFyQXGnxMoS5IXopV5tmgQ4M4585xXso4/Dw192Vq/68NPIB2V\nywa6fCo6VC7/hHMe0v5GFVJzmSymEYF3b0CNHZVFx1K793hHrYjH1Dj4NcRlqyln\nKp3IrABhPPW8l67gS6f8RicZwzWOH3Ubwv4kivlTtDusqeX+/7mlXrvGTYd5G39P\n70jSwUeekfYkQYGT5yLjFCOTM98ApG4iHnryEkpNldMk9JRozoN3VT5PDv6b7EtR\nYsG1UiZNn0rq1TurFHdsX7G8LZX1jBe1XNy883FeuPlXuPQwGcds+Q5UpiGoM5Kj\nxx0SGiaK4Lg9tOsGDvHDvrtgl9vIGYy07953Gre+xUhdNs+AnG8KhwKs+n3WYjcL\nlH3ffMkq/NTVohaNaIcNk4YQ7Y5+y9Y0Z2YuYTmaOipxMNEpOnvJj6LB1H5Qgj4M\nLIuUxs1gl2b7B93J95w8FmdFewvUCgcZwTxU2ltsYAcZHnRwWE0twYP5v1Pc8tOG\nMZuvS0pTI+hgve1viS0inOnRpoYv+KzkaSYEhvsS16NgDuRUOqE=\n=eOPj\n-----END PGP SIGNATURE-----\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-24795"
},
{
"db": "PACKETSTORM",
"id": "178035"
},
{
"db": "PACKETSTORM",
"id": "178131"
},
{
"db": "PACKETSTORM",
"id": "178096"
},
{
"db": "PACKETSTORM",
"id": "178298"
},
{
"db": "PACKETSTORM",
"id": "181910"
},
{
"db": "PACKETSTORM",
"id": "179789"
}
],
"trust": 1.44
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-24795",
"trust": 1.6
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2024/04/04/5",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "178035",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "178131",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "178096",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "178298",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "181910",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "179789",
"trust": 0.1
}
],
"sources": [
{
"db": "PACKETSTORM",
"id": "178035"
},
{
"db": "PACKETSTORM",
"id": "178131"
},
{
"db": "PACKETSTORM",
"id": "178096"
},
{
"db": "PACKETSTORM",
"id": "178298"
},
{
"db": "PACKETSTORM",
"id": "181910"
},
{
"db": "PACKETSTORM",
"id": "179789"
},
{
"db": "NVD",
"id": "CVE-2024-24795"
}
]
},
"id": "VAR-202404-0121",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.625
},
"last_update_date": "2025-07-01T21:18:45.102000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-113",
"trust": 1.0
},
{
"problemtype": "CWE-444",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2024-24795"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.0,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/wnv4szapvs43dzwnfu7xbyyozezmi4zc/"
},
{
"trust": 1.0,
"url": "http://seclists.org/fulldisclosure/2024/jul/18"
},
{
"trust": 1.0,
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html"
},
{
"trust": 1.0,
"url": "http://www.openwall.com/lists/oss-security/2024/04/04/5"
},
{
"trust": 1.0,
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
},
{
"trust": 1.0,
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html"
},
{
"trust": 1.0,
"url": "https://support.apple.com/kb/ht214119"
},
{
"trust": 1.0,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/lx5u34kygdyprh3aj6mddcbjdwdpxnvj/"
},
{
"trust": 1.0,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/i2n2nzex3mr64iwsgl3qgn7ksrugaemf/"
},
{
"trust": 1.0,
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-27316"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-24795"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-38709"
},
{
"trust": 0.3,
"url": "https://ubuntu.com/security/notices/usn-6729-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apache2/2.4.52-1ubuntu4.9"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apache2/2.4.41-4ubuntu3.17"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apache2/2.4.57-2ubuntu2.4"
},
{
"trust": 0.1,
"url": "https://ubuntu.com/security/notices/usn-6729-2"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-43622"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-45802"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "https://security-tracker.debian.org/tracker/apache2"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-31122"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "https://ubuntu.com/security/notices/usn-6729-3"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apache2/2.4.58-1ubuntu8.1"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-36387"
},
{
"trust": 0.1,
"url": "https://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-38474"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-38476"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-39573"
},
{
"trust": 0.1,
"url": "https://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-38473"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-39884"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-38475"
},
{
"trust": 0.1,
"url": "https://security.gentoo.org/glsa/202409-31"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-38472"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-40898"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-40725"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-38477"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-27872"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-27952"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-2004"
},
{
"trust": 0.1,
"url": "https://support.apple.com/ht201222."
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-52356"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-27863"
},
{
"trust": 0.1,
"url": "https://support.apple.com/ht201222"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-2466"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-2379"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-27871"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-6277"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-2398"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-27862"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.1,
"url": "https://support.apple.com/ht214119."
},
{
"trust": 0.1,
"url": "https://support.apple.com/downloads/"
}
],
"sources": [
{
"db": "PACKETSTORM",
"id": "178035"
},
{
"db": "PACKETSTORM",
"id": "178131"
},
{
"db": "PACKETSTORM",
"id": "178096"
},
{
"db": "PACKETSTORM",
"id": "178298"
},
{
"db": "PACKETSTORM",
"id": "181910"
},
{
"db": "PACKETSTORM",
"id": "179789"
},
{
"db": "NVD",
"id": "CVE-2024-24795"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "PACKETSTORM",
"id": "178035"
},
{
"db": "PACKETSTORM",
"id": "178131"
},
{
"db": "PACKETSTORM",
"id": "178096"
},
{
"db": "PACKETSTORM",
"id": "178298"
},
{
"db": "PACKETSTORM",
"id": "181910"
},
{
"db": "PACKETSTORM",
"id": "179789"
},
{
"db": "NVD",
"id": "CVE-2024-24795"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-04-12T14:46:14",
"db": "PACKETSTORM",
"id": "178035"
},
{
"date": "2024-04-18T15:28:17",
"db": "PACKETSTORM",
"id": "178131"
},
{
"date": "2024-04-17T15:49:51",
"db": "PACKETSTORM",
"id": "178096"
},
{
"date": "2024-04-29T14:47:52",
"db": "PACKETSTORM",
"id": "178298"
},
{
"date": "2024-09-30T14:35:24",
"db": "PACKETSTORM",
"id": "181910"
},
{
"date": "2024-07-30T12:21:31",
"db": "PACKETSTORM",
"id": "179789"
},
{
"date": "2024-04-04T20:15:08.663000",
"db": "NVD",
"id": "CVE-2024-24795"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-30T12:55:47.280000",
"db": "NVD",
"id": "CVE-2024-24795"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "178035"
},
{
"db": "PACKETSTORM",
"id": "178131"
},
{
"db": "PACKETSTORM",
"id": "178298"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ubuntu Security Notice USN-6729-1",
"sources": [
{
"db": "PACKETSTORM",
"id": "178035"
}
],
"trust": 0.1
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "overflow, spoof, code execution",
"sources": [
{
"db": "PACKETSTORM",
"id": "179789"
}
],
"trust": 0.1
}
}
GHSA-C4CH-CV96-R58V
Vulnerability from github – Published: 2024-04-04 21:30 – Updated: 2024-11-12 21:30HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.
Users are recommended to upgrade to version 2.4.59, which fixes this issue.
{
"affected": [],
"aliases": [
"CVE-2024-24795"
],
"database_specific": {
"cwe_ids": [
"CWE-113",
"CWE-444"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-04-04T20:15:08Z",
"severity": "MODERATE"
},
"details": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue.",
"id": "GHSA-c4ch-cv96-r58v",
"modified": "2024-11-12T21:30:49Z",
"published": "2024-04-04T21:30:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24795"
},
{
"type": "WEB",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240415-0013"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT214119"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Jul/18"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/04/04/5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.