Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-55753 (GCVE-0-2025-55753)
Vulnerability from cvelistv5 – Published: 2025-12-05 10:12 – Updated: 2025-12-05 19:27- CWE-190 - Integer Overflow or Wraparound
| URL | Tags |
|---|---|
| https://httpd.apache.org/security/vulnerabilities… | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server |
Affected:
2.4.30 , < 2.4.66
(semver)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-12-05T11:05:52.628Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/4"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-55753",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-05T19:26:40.760698Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-05T19:27:31.842Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Apache HTTP Server",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "2.4.66",
"status": "affected",
"version": "2.4.30",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Aisle Research"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 2.4.66, which fixes the issue.\u003c/p\u003e"
}
],
"value": "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue."
}
],
"metrics": [
{
"other": {
"content": {
"text": "low"
},
"type": "Textual description of severity"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "CWE-190 Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-05T10:12:22.041Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2025-08-15T10:58:00.000Z",
"value": "reported"
},
{
"lang": "en",
"time": "2025-11-20T12:00:00.000Z",
"value": "fixed by r1929884 in 2.4.x"
}
],
"title": "Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2025-55753",
"datePublished": "2025-12-05T10:12:22.041Z",
"dateReserved": "2025-08-15T08:38:37.265Z",
"dateUpdated": "2025-12-05T19:27:31.842Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-55753",
"date": "2026-05-22",
"epss": "0.00048",
"percentile": "0.152"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-55753\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-12-05T11:15:51.890\",\"lastModified\":\"2025-12-10T16:39:14.227\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\\n\\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\\n\\n\\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.30\",\"versionEndExcluding\":\"2.4.66\",\"matchCriteriaId\":\"F12C6C19-6BDC-46A8-8FF3-CD474A165126\"}]}]}],\"references\":[{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/12/04/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/12/04/4\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-12-05T11:05:52.628Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-55753\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-05T19:26:40.760698Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-05T19:26:58.792Z\"}}], \"cna\": {\"title\": \"Apache HTTP Server: mod_md (ACME), unintended retry intervals\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Aisle Research\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"low\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache HTTP Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.4.30\", \"lessThan\": \"2.4.66\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-08-15T10:58:00.000Z\", \"value\": \"reported\"}, {\"lang\": \"en\", \"time\": \"2025-11-20T12:00:00.000Z\", \"value\": \"fixed by r1929884 in 2.4.x\"}], \"references\": [{\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\\n\\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\\n\\n\\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAn integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 2.4.66, which fixes the issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-190\", \"description\": \"CWE-190 Integer Overflow or Wraparound\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-12-05T10:12:22.041Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-55753\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-05T19:27:31.842Z\", \"dateReserved\": \"2025-08-15T08:38:37.265Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2025-12-05T10:12:22.041Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:0011
Vulnerability from csaf_redhat - Published: 2026-01-05 02:00 - Updated: 2026-04-19 19:43An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
A server side include handling flaw has been discovered in the Apache HTTP server. When Server Side Includes (SSI) areenabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives an attacker may be able to inject commands executed by the server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)\n\n* httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0011",
"url": "https://access.redhat.com/errata/RHSA-2026:0011"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0011.json"
}
],
"title": "Red Hat Security Advisory: httpd:2.4 security update",
"tracking": {
"current_release_date": "2026-04-19T19:43:00+00:00",
"generator": {
"date": "2026-04-19T19:43:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:0011",
"initial_release_date": "2026-01-05T02:00:58+00:00",
"revision_history": [
{
"date": "2026-01-05T02:00:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-05T02:00:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-19T19:43:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src (httpd:2.4)",
"product_id": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=src\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=src\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=src\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"product": {
"name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch (httpd:2.4)",
"product_id": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=noarch\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"product": {
"name": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch (httpd:2.4)",
"product_id": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=noarch\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64 (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64 (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64 (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64 (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64 (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64 (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B23463%2B5d5709c6.4?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.6.0%2B23843%2Bc27a5dc4.1?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B23843%2Bc27a5dc4.12?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8060020251223095927:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4"
},
"product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4"
},
"product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4"
},
"product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4"
},
"product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4"
},
"product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4"
},
"product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T02:00:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0011"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
},
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-05T14:00:53.379125+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419365"
}
],
"notes": [
{
"category": "description",
"text": "A server side include handling flaw has been discovered in the Apache HTTP server. When Server Side Includes (SSI) areenabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives an attacker may be able to inject commands executed by the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "RHBZ#2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T13:40:39.772000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T02:00:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0011"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.AUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.aarch64::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.ppc64le::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.s390x::httpd:2.4",
"AppStream-8.6.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-debugsource-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-devel-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-filesystem-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-manual-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.noarch::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+23463+5d5709c6.4.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.src::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.6.0+23843+c27a5dc4.1.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4",
"AppStream-8.6.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+23843+c27a5dc4.12.x86_64::httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=..."
}
]
}
RHSA-2026:0012
Vulnerability from csaf_redhat - Published: 2026-01-05 02:01 - Updated: 2026-04-19 19:42An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
A server side include handling flaw has been discovered in the Apache HTTP server. When Server Side Includes (SSI) areenabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives an attacker may be able to inject commands executed by the server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)\n\n* httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0012",
"url": "https://access.redhat.com/errata/RHSA-2026:0012"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0012.json"
}
],
"title": "Red Hat Security Advisory: httpd:2.4 security update",
"tracking": {
"current_release_date": "2026-04-19T19:42:55+00:00",
"generator": {
"date": "2026-04-19T19:42:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:0012",
"initial_release_date": "2026-01-05T02:01:38+00:00",
"revision_history": [
{
"date": "2026-01-05T02:01:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-05T02:01:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-19T19:42:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src (httpd:2.4)",
"product_id": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=src\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B23464%2Ba2e0c444.6?arch=src\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.8.0%2B23840%2Bd7e7db80.1?arch=src\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"product": {
"name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch (httpd:2.4)",
"product_id": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=noarch\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"product": {
"name": "httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch (httpd:2.4)",
"product_id": "httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=noarch\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B23464%2Ba2e0c444.6?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B23464%2Ba2e0c444.6?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B23464%2Ba2e0c444.6?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.8.0%2B23840%2Bd7e7db80.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.8.0%2B23840%2Bd7e7db80.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.8.0%2B23840%2Bd7e7db80.1?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4)",
"product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B23464%2Ba2e0c444.6?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4)",
"product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B23464%2Ba2e0c444.6?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"product": {
"name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4)",
"product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B23464%2Ba2e0c444.6?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"product": {
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4)",
"product_id": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.8.0%2B23840%2Bd7e7db80.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"product": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4)",
"product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.8.0%2B23840%2Bd7e7db80.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"product": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4)",
"product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.8.0%2B23840%2Bd7e7db80.1?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B23840%2Bd7e7db80.11?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8080020251223093308:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4"
},
"product_reference": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4"
},
"product_reference": "httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4"
},
"product_reference": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4"
},
"product_reference": "httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4"
},
"product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4"
},
"product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64 (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T02:01:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0012"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
},
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-05T14:00:53.379125+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419365"
}
],
"notes": [
{
"category": "description",
"text": "A server side include handling flaw has been discovered in the Apache HTTP server. When Server Side Includes (SSI) areenabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives an attacker may be able to inject commands executed by the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "RHBZ#2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T13:40:39.772000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T02:01:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0012"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.ppc64le::httpd:2.4",
"AppStream-8.8.0.Z.E4S:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-debugsource-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-devel-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-filesystem-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-manual-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.noarch::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+23464+a2e0c444.6.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.src::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debuginfo-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_md-debugsource-1:2.0.8-8.module+el8.8.0+23840+d7e7db80.1.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4",
"AppStream-8.8.0.Z.TUS:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+23840+d7e7db80.11.x86_64::httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=..."
}
]
}
RHSA-2026:0029
Vulnerability from csaf_redhat - Published: 2026-01-05 05:28 - Updated: 2026-03-18 03:15An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mod_md is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal.\n\nSecurity Fix(es):\n\n* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0029",
"url": "https://access.redhat.com/errata/RHSA-2026:0029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0029.json"
}
],
"title": "Red Hat Security Advisory: mod_md security update",
"tracking": {
"current_release_date": "2026-03-18T03:15:22+00:00",
"generator": {
"date": "2026-03-18T03:15:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:0029",
"initial_release_date": "2026-01-05T05:28:58+00:00",
"revision_history": [
{
"date": "2026-01-05T05:28:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-05T05:28:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T03:15:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_4.1.src",
"product": {
"name": "mod_md-1:2.4.19-1.el9_4.1.src",
"product_id": "mod_md-1:2.4.19-1.el9_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_4.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_4.1.aarch64",
"product": {
"name": "mod_md-1:2.4.19-1.el9_4.1.aarch64",
"product_id": "mod_md-1:2.4.19-1.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_4.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64",
"product": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64",
"product_id": "mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.19-1.el9_4.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64",
"product": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64",
"product_id": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.19-1.el9_4.1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_4.1.ppc64le",
"product": {
"name": "mod_md-1:2.4.19-1.el9_4.1.ppc64le",
"product_id": "mod_md-1:2.4.19-1.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_4.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le",
"product": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le",
"product_id": "mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.19-1.el9_4.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le",
"product": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le",
"product_id": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.19-1.el9_4.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_4.1.x86_64",
"product": {
"name": "mod_md-1:2.4.19-1.el9_4.1.x86_64",
"product_id": "mod_md-1:2.4.19-1.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_4.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64",
"product": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64",
"product_id": "mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.19-1.el9_4.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64",
"product": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64",
"product_id": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.19-1.el9_4.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_4.1.s390x",
"product": {
"name": "mod_md-1:2.4.19-1.el9_4.1.s390x",
"product_id": "mod_md-1:2.4.19-1.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_4.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x",
"product": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x",
"product_id": "mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.19-1.el9_4.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x",
"product": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x",
"product_id": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.19-1.el9_4.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.aarch64"
},
"product_reference": "mod_md-1:2.4.19-1.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.ppc64le"
},
"product_reference": "mod_md-1:2.4.19-1.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.s390x"
},
"product_reference": "mod_md-1:2.4.19-1.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.src"
},
"product_reference": "mod_md-1:2.4.19-1.el9_4.1.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.x86_64"
},
"product_reference": "mod_md-1:2.4.19-1.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64"
},
"product_reference": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le"
},
"product_reference": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x"
},
"product_reference": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64"
},
"product_reference": "mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64"
},
"product_reference": "mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le"
},
"product_reference": "mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x"
},
"product_reference": "mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64"
},
"product_reference": "mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T05:28:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0029"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:mod_md-1:2.4.19-1.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-debuginfo-1:2.4.19-1.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:mod_md-debugsource-1:2.4.19-1.el9_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
}
]
}
RHSA-2026:0030
Vulnerability from csaf_redhat - Published: 2026-01-05 05:19 - Updated: 2026-03-18 03:15An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mod_md is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal.\n\nSecurity Fix(es):\n\n* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0030",
"url": "https://access.redhat.com/errata/RHSA-2026:0030"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0030.json"
}
],
"title": "Red Hat Security Advisory: mod_md security update",
"tracking": {
"current_release_date": "2026-03-18T03:15:26+00:00",
"generator": {
"date": "2026-03-18T03:15:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:0030",
"initial_release_date": "2026-01-05T05:19:04+00:00",
"revision_history": [
{
"date": "2026-01-05T05:19:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-05T05:19:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T03:15:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_2.1.src",
"product": {
"name": "mod_md-1:2.4.19-1.el9_2.1.src",
"product_id": "mod_md-1:2.4.19-1.el9_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_2.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_2.1.aarch64",
"product": {
"name": "mod_md-1:2.4.19-1.el9_2.1.aarch64",
"product_id": "mod_md-1:2.4.19-1.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64",
"product": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64",
"product_id": "mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.19-1.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64",
"product": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64",
"product_id": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.19-1.el9_2.1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_2.1.ppc64le",
"product": {
"name": "mod_md-1:2.4.19-1.el9_2.1.ppc64le",
"product_id": "mod_md-1:2.4.19-1.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le",
"product": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le",
"product_id": "mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.19-1.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le",
"product": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le",
"product_id": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.19-1.el9_2.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_2.1.x86_64",
"product": {
"name": "mod_md-1:2.4.19-1.el9_2.1.x86_64",
"product_id": "mod_md-1:2.4.19-1.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64",
"product": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64",
"product_id": "mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.19-1.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64",
"product": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64",
"product_id": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.19-1.el9_2.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.19-1.el9_2.1.s390x",
"product": {
"name": "mod_md-1:2.4.19-1.el9_2.1.s390x",
"product_id": "mod_md-1:2.4.19-1.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.19-1.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x",
"product": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x",
"product_id": "mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.19-1.el9_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x",
"product": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x",
"product_id": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.19-1.el9_2.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.aarch64"
},
"product_reference": "mod_md-1:2.4.19-1.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.ppc64le"
},
"product_reference": "mod_md-1:2.4.19-1.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.s390x"
},
"product_reference": "mod_md-1:2.4.19-1.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.src"
},
"product_reference": "mod_md-1:2.4.19-1.el9_2.1.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.19-1.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.x86_64"
},
"product_reference": "mod_md-1:2.4.19-1.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64"
},
"product_reference": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le"
},
"product_reference": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x"
},
"product_reference": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64"
},
"product_reference": "mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64"
},
"product_reference": "mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le"
},
"product_reference": "mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x"
},
"product_reference": "mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64"
},
"product_reference": "mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.src",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T05:19:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.src",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0030"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.src",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.src",
"AppStream-9.2.0.Z.E4S:mod_md-1:2.4.19-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-debuginfo-1:2.4.19-1.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:mod_md-debugsource-1:2.4.19-1.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
}
]
}
RHSA-2026:0092
Vulnerability from csaf_redhat - Published: 2026-01-06 00:47 - Updated: 2026-03-18 03:15An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mod_md is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal.\n\nSecurity Fix(es):\n\n* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0092",
"url": "https://access.redhat.com/errata/RHSA-2026:0092"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0092.json"
}
],
"title": "Red Hat Security Advisory: mod_md security update",
"tracking": {
"current_release_date": "2026-03-18T03:15:25+00:00",
"generator": {
"date": "2026-03-18T03:15:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:0092",
"initial_release_date": "2026-01-06T00:47:11+00:00",
"revision_history": [
{
"date": "2026-01-06T00:47:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-06T00:47:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T03:15:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.0-3.el9_0.1.src",
"product": {
"name": "mod_md-1:2.4.0-3.el9_0.1.src",
"product_id": "mod_md-1:2.4.0-3.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.0-3.el9_0.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.0-3.el9_0.1.aarch64",
"product": {
"name": "mod_md-1:2.4.0-3.el9_0.1.aarch64",
"product_id": "mod_md-1:2.4.0-3.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.0-3.el9_0.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64",
"product": {
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64",
"product_id": "mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.0-3.el9_0.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64",
"product": {
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64",
"product_id": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.0-3.el9_0.1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.0-3.el9_0.1.ppc64le",
"product": {
"name": "mod_md-1:2.4.0-3.el9_0.1.ppc64le",
"product_id": "mod_md-1:2.4.0-3.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.0-3.el9_0.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le",
"product": {
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le",
"product_id": "mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.0-3.el9_0.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le",
"product": {
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le",
"product_id": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.0-3.el9_0.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.0-3.el9_0.1.x86_64",
"product": {
"name": "mod_md-1:2.4.0-3.el9_0.1.x86_64",
"product_id": "mod_md-1:2.4.0-3.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.0-3.el9_0.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64",
"product": {
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64",
"product_id": "mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.0-3.el9_0.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64",
"product": {
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64",
"product_id": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.0-3.el9_0.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.0-3.el9_0.1.s390x",
"product": {
"name": "mod_md-1:2.4.0-3.el9_0.1.s390x",
"product_id": "mod_md-1:2.4.0-3.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.0-3.el9_0.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x",
"product": {
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x",
"product_id": "mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.0-3.el9_0.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x",
"product": {
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x",
"product_id": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.0-3.el9_0.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.0-3.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.aarch64"
},
"product_reference": "mod_md-1:2.4.0-3.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.0-3.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.ppc64le"
},
"product_reference": "mod_md-1:2.4.0-3.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.0-3.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.s390x"
},
"product_reference": "mod_md-1:2.4.0-3.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.0-3.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.src"
},
"product_reference": "mod_md-1:2.4.0-3.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.0-3.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.x86_64"
},
"product_reference": "mod_md-1:2.4.0-3.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64"
},
"product_reference": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le"
},
"product_reference": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x"
},
"product_reference": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64"
},
"product_reference": "mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64"
},
"product_reference": "mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le"
},
"product_reference": "mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x"
},
"product_reference": "mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64"
},
"product_reference": "mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-06T00:47:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0092"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:mod_md-1:2.4.0-3.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-debuginfo-1:2.4.0-3.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:mod_md-debugsource-1:2.4.0-3.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
}
]
}
RHSA-2026:0093
Vulnerability from csaf_redhat - Published: 2026-01-06 01:44 - Updated: 2026-03-18 03:15An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mod_md is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal.\n\nSecurity Fix(es):\n\n* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0093",
"url": "https://access.redhat.com/errata/RHSA-2026:0093"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0093.json"
}
],
"title": "Red Hat Security Advisory: mod_md security update",
"tracking": {
"current_release_date": "2026-03-18T03:15:23+00:00",
"generator": {
"date": "2026-03-18T03:15:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:0093",
"initial_release_date": "2026-01-06T01:44:58+00:00",
"revision_history": [
{
"date": "2026-01-06T01:44:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-06T01:44:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T03:15:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-3.el10_0.1.src",
"product": {
"name": "mod_md-1:2.4.26-3.el10_0.1.src",
"product_id": "mod_md-1:2.4.26-3.el10_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-3.el10_0.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-3.el10_0.1.aarch64",
"product": {
"name": "mod_md-1:2.4.26-3.el10_0.1.aarch64",
"product_id": "mod_md-1:2.4.26-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-3.el10_0.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64",
"product": {
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64",
"product_id": "mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.26-3.el10_0.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64",
"product": {
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64",
"product_id": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.26-3.el10_0.1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-3.el10_0.1.ppc64le",
"product": {
"name": "mod_md-1:2.4.26-3.el10_0.1.ppc64le",
"product_id": "mod_md-1:2.4.26-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-3.el10_0.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le",
"product": {
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le",
"product_id": "mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.26-3.el10_0.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le",
"product": {
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le",
"product_id": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.26-3.el10_0.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-3.el10_0.1.s390x",
"product": {
"name": "mod_md-1:2.4.26-3.el10_0.1.s390x",
"product_id": "mod_md-1:2.4.26-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-3.el10_0.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x",
"product": {
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x",
"product_id": "mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.26-3.el10_0.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x",
"product": {
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x",
"product_id": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.26-3.el10_0.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-3.el10_0.1.x86_64",
"product": {
"name": "mod_md-1:2.4.26-3.el10_0.1.x86_64",
"product_id": "mod_md-1:2.4.26-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-3.el10_0.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64",
"product": {
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64",
"product_id": "mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.26-3.el10_0.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64",
"product": {
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64",
"product_id": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.26-3.el10_0.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.aarch64"
},
"product_reference": "mod_md-1:2.4.26-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.ppc64le"
},
"product_reference": "mod_md-1:2.4.26-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.s390x"
},
"product_reference": "mod_md-1:2.4.26-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-3.el10_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.src"
},
"product_reference": "mod_md-1:2.4.26-3.el10_0.1.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.x86_64"
},
"product_reference": "mod_md-1:2.4.26-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64"
},
"product_reference": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le"
},
"product_reference": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x"
},
"product_reference": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64"
},
"product_reference": "mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64"
},
"product_reference": "mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le"
},
"product_reference": "mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x"
},
"product_reference": "mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64"
},
"product_reference": "mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-06T01:44:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0093"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:mod_md-1:2.4.26-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-debuginfo-1:2.4.26-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:mod_md-debugsource-1:2.4.26-3.el10_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
}
]
}
RHSA-2026:0094
Vulnerability from csaf_redhat - Published: 2026-01-06 05:05 - Updated: 2026-03-18 03:15An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for mod_md is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal.\n\nSecurity Fix(es):\n\n* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0094",
"url": "https://access.redhat.com/errata/RHSA-2026:0094"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0094.json"
}
],
"title": "Red Hat Security Advisory: mod_md security update",
"tracking": {
"current_release_date": "2026-03-18T03:15:22+00:00",
"generator": {
"date": "2026-03-18T03:15:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:0094",
"initial_release_date": "2026-01-06T05:05:51+00:00",
"revision_history": [
{
"date": "2026-01-06T05:05:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-06T05:05:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T03:15:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-1.el9_6.1.s390x",
"product": {
"name": "mod_md-1:2.4.26-1.el9_6.1.s390x",
"product_id": "mod_md-1:2.4.26-1.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-1.el9_6.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x",
"product": {
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x",
"product_id": "mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.26-1.el9_6.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x",
"product": {
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x",
"product_id": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.26-1.el9_6.1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-1.el9_6.1.src",
"product": {
"name": "mod_md-1:2.4.26-1.el9_6.1.src",
"product_id": "mod_md-1:2.4.26-1.el9_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-1.el9_6.1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-1.el9_6.1.aarch64",
"product": {
"name": "mod_md-1:2.4.26-1.el9_6.1.aarch64",
"product_id": "mod_md-1:2.4.26-1.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-1.el9_6.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64",
"product": {
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64",
"product_id": "mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.26-1.el9_6.1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64",
"product": {
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64",
"product_id": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.26-1.el9_6.1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-1.el9_6.1.ppc64le",
"product": {
"name": "mod_md-1:2.4.26-1.el9_6.1.ppc64le",
"product_id": "mod_md-1:2.4.26-1.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-1.el9_6.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le",
"product": {
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le",
"product_id": "mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.26-1.el9_6.1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le",
"product": {
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le",
"product_id": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.26-1.el9_6.1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_md-1:2.4.26-1.el9_6.1.x86_64",
"product": {
"name": "mod_md-1:2.4.26-1.el9_6.1.x86_64",
"product_id": "mod_md-1:2.4.26-1.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.26-1.el9_6.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64",
"product": {
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64",
"product_id": "mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debugsource@2.4.26-1.el9_6.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64",
"product": {
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64",
"product_id": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.26-1.el9_6.1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-1.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.aarch64"
},
"product_reference": "mod_md-1:2.4.26-1.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-1.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.ppc64le"
},
"product_reference": "mod_md-1:2.4.26-1.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-1.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.s390x"
},
"product_reference": "mod_md-1:2.4.26-1.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-1.el9_6.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.src"
},
"product_reference": "mod_md-1:2.4.26-1.el9_6.1.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-1:2.4.26-1.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.x86_64"
},
"product_reference": "mod_md-1:2.4.26-1.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64"
},
"product_reference": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le"
},
"product_reference": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x"
},
"product_reference": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64"
},
"product_reference": "mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64"
},
"product_reference": "mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le"
},
"product_reference": "mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x"
},
"product_reference": "mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64"
},
"product_reference": "mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-06T05:05:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0094"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:mod_md-1:2.4.26-1.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-debuginfo-1:2.4.26-1.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:mod_md-debugsource-1:2.4.26-1.el9_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
}
]
}
RHSA-2026:2994
Vulnerability from csaf_redhat - Published: 2026-02-23 19:20 - Updated: 2026-05-19 21:13A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Workaround
|
A server side include handling flaw has been discovered in the Apache HTTP server. When Server Side Includes (SSI) areenabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives an attacker may be able to inject commands executed by the server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
A configuration override flaw has been discovered in the apache HTTP server. Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
A permissions bypass flaw has been discovered in the apache HTTP server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64 | — |
Workaround
|
A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 3 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 3 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 2, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap [jbcs-httpd-2.4] (CVE-2025-9230)\n* jbcs-httpd24-httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... [jbcs-httpd-2.4] (CVE-2025-58098)\n* jbcs-httpd24-httpd: Apache HTTP Server: mod_md (ACME), unintended retry intervals [jbcs-httpd-2.4] (CVE-2025-55753)\n* jbcs-httpd24-httpd: Apache HTTP Server: CGI environment variable override [jbcs-httpd-2.4] (CVE-2025-65082)\n* jbcs-httpd24-httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo [jbcs-httpd-2.4] (CVE-2025-66200)\n* openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 (CVE-2025-69419)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2994",
"url": "https://access.redhat.com/errata/RHSA-2026:2994"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_3_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_3_release_notes/index"
},
{
"category": "external",
"summary": "2396054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396054"
},
{
"category": "external",
"summary": "2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2994.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 SP3 security update",
"tracking": {
"current_release_date": "2026-05-19T21:13:39+00:00",
"generator": {
"date": "2026-05-19T21:13:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:2994",
"initial_release_date": "2026-02-23T19:20:23+00:00",
"revision_history": [
{
"date": "2026-02-23T19:20:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T19:20:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-19T21:13:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 8",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"product_id": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1k-21.el7jbcs?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.12-5.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-25.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"product_id": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl@8.11.0-4.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"product_id": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.3-4.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-11.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@2.0.29-8.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.50-12.redhat_1.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-7.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.28-13.el7jbcs?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.6-14.el7jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"product_id": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.3-4.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-11.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@2.0.29-8.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.50-12.redhat_1.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-7.el8jbcs?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.28-13.el8jbcs?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.6-14.el8jbcs?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1k-21.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1k-21.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1k-21.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1k-21.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1k-21.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1k-21.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.12-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.12-5.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-25.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-25.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl@8.11.0-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@8.11.0-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@8.11.0-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@8.11.0-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.3-4.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-11.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.62-11.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.62-11.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.62-11.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.62-11.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.62-11.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.62-11.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.62-11.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.62-11.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@2.0.29-8.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@2.0.29-8.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.50-12.redhat_1.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.50-12.redhat_1.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-7.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.22-7.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.28-13.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.28-13.el7jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.6-14.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.6-14.el7jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.3-4.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.62-11.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.62-11.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.62-11.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.62-11.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.62-11.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@2.0.29-8.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@2.0.29-8.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.50-12.redhat_1.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.50-12.redhat_1.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-7.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.22-7.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.28-13.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.28-13.el8jbcs?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.6-14.el8jbcs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.6-14.el8jbcs?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.62-11.el7jbcs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.62-11.el8jbcs?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8",
"product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"relates_to_product_reference": "8Base-JBCS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-09-17T12:15:34.387000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396054"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability was rated as Moderate because, while the potential impact includes an application level denial of service and possible arbitrary code execution, successful exploitation is considered unlikely due to the high attack complexity and the fact that password-based CMS encryption (PWRI) is rarely used in real-world deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64"
],
"known_not_affected": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9230"
},
{
"category": "external",
"summary": "RHBZ#2396054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396054"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230"
}
],
"release_date": "2025-09-30T23:59:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:20:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2994"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap"
},
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64"
],
"known_not_affected": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:20:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2994"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
},
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-05T14:00:53.379125+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419365"
}
],
"notes": [
{
"category": "description",
"text": "A server side include handling flaw has been discovered in the Apache HTTP server. When Server Side Includes (SSI) areenabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives an attacker may be able to inject commands executed by the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
],
"known_not_affected": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "RHBZ#2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T13:40:39.772000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:20:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2994"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=..."
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"discovery_date": "2025-12-05T11:00:52.797985+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419139"
}
],
"notes": [
{
"category": "description",
"text": "A configuration override flaw has been discovered in the apache HTTP server. Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: CGI environment variable override",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
],
"known_not_affected": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "RHBZ#2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:46:27.138000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:20:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2994"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: CGI environment variable override"
},
{
"cve": "CVE-2025-66200",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2025-12-05T12:00:53.623799+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419262"
}
],
"notes": [
{
"category": "description",
"text": "A permissions bypass flaw has been discovered in the apache HTTP server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
],
"known_not_affected": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "RHBZ#2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/12/04/8",
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/8"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T11:02:25.722000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:20:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2994"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo"
},
{
"cve": "CVE-2025-69419",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-01-16T14:21:52.793000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. An out-of-bounds write in OpenSSL\u0027s PKCS12_get_friendlyname() function can lead to denial of service or arbitrary code execution. Exploitation requires an application to parse a specially crafted malicious PKCS#12 file. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "RHBZ#2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:20:23+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2994"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, Red Hat recommends avoiding the processing of PKCS#12 files from untrusted or unverified sources. Applications that use the `PKCS12_get_friendlyname()` API should ensure that PKCS#12 files are only processed if they originate from trusted entities. Restricting the input sources for PKCS#12 files can significantly reduce the attack surface for this flaw.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.11.0-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.50-12.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-21.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.12-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-21.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.3-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.62-11.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:2.0.29-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.50-12.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.50-12.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.28-13.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.22-7.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.6-14.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.62-11.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.62-11.el8jbcs.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing"
}
]
}
RHSA-2026:2995
Vulnerability from csaf_redhat - Published: 2026-02-23 19:19 - Updated: 2026-05-19 21:13A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Core Services 2.4.62.SP3
Red Hat / Red Hat JBoss Core Services
|
cpe:/a:redhat:jboss_core_services:1
|
— |
Vendor Fix
fix
Workaround
|
A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Core Services 2.4.62.SP3
Red Hat / Red Hat JBoss Core Services
|
cpe:/a:redhat:jboss_core_services:1
|
— |
Vendor Fix
fix
Workaround
|
An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Core Services 2.4.62.SP3
Red Hat / Red Hat JBoss Core Services
|
cpe:/a:redhat:jboss_core_services:1
|
— |
Vendor Fix
fix
Workaround
|
A server side include handling flaw has been discovered in the Apache HTTP server. When Server Side Includes (SSI) areenabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives an attacker may be able to inject commands executed by the server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Core Services 2.4.62.SP3
Red Hat / Red Hat JBoss Core Services
|
cpe:/a:redhat:jboss_core_services:1
|
— |
Vendor Fix
fix
Workaround
|
A configuration override flaw has been discovered in the apache HTTP server. Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Core Services 2.4.62.SP3
Red Hat / Red Hat JBoss Core Services
|
cpe:/a:redhat:jboss_core_services:1
|
— |
Vendor Fix
fix
Workaround
|
A permissions bypass flaw has been discovered in the apache HTTP server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Core Services 2.4.62.SP3
Red Hat / Red Hat JBoss Core Services
|
cpe:/a:redhat:jboss_core_services:1
|
— |
Vendor Fix
fix
Workaround
|
A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Core Services 2.4.62.SP3
Red Hat / Red Hat JBoss Core Services
|
cpe:/a:redhat:jboss_core_services:1
|
— |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 3 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 3 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 2, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... [jbcs-httpd-2.4] (CVE-2025-58098)\n* jbcs-httpd24-httpd: Apache HTTP Server: mod_md (ACME), unintended retry intervals [jbcs-httpd-2.4] (CVE-2025-55753)\n* jbcs-httpd24-httpd: Apache HTTP Server: CGI environment variable override [jbcs-httpd-2.4] (CVE-2025-65082)\n* jbcs-httpd24-httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo [jbcs-httpd-2.4] (CVE-2025-66200)\n* openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap [jbcs-httpd-2.4] (CVE-2025-9230)\n* openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 (CVE-2025-69419)\n*[Minor Incident] openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2995",
"url": "https://access.redhat.com/errata/RHSA-2026:2995"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_3_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_3_release_notes/index"
},
{
"category": "external",
"summary": "2396054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396054"
},
{
"category": "external",
"summary": "2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2995.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 SP3 security update",
"tracking": {
"current_release_date": "2026-05-19T21:13:39+00:00",
"generator": {
"date": "2026-05-19T21:13:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:2995",
"initial_release_date": "2026-02-23T19:19:20+00:00",
"revision_history": [
{
"date": "2026-02-23T19:19:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T19:19:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-19T21:13:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services 2.4.62.SP3",
"product": {
"name": "Red Hat JBoss Core Services 2.4.62.SP3",
"product_id": "Red Hat JBoss Core Services 2.4.62.SP3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-09-17T12:15:34.387000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396054"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the OpenSSL CMS implementation (RFC 3211 KEK Unwrap). This vulnerability allows memory corruption, an application level denial of service, or potential execution of attacker-supplied code via crafted CMS messages using password-based encryption (PWRI).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability was rated as Moderate because, while the potential impact includes an application level denial of service and possible arbitrary code execution, successful exploitation is considered unlikely due to the high attack complexity and the fact that password-based CMS encryption (PWRI) is rarely used in real-world deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9230"
},
{
"category": "external",
"summary": "RHBZ#2396054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396054"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230"
}
],
"release_date": "2025-09-30T23:59:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:19:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2995"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:19:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2995"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-12-05T11:00:56.469663+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419140"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "RHBZ#2419140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55753"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:12:22.041000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:19:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2995"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals"
},
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2025-12-05T14:00:53.379125+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419365"
}
],
"notes": [
{
"category": "description",
"text": "A server side include handling flaw has been discovered in the Apache HTTP server. When Server Side Includes (SSI) areenabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives an attacker may be able to inject commands executed by the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "RHBZ#2419365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58098"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T13:40:39.772000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:19:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2995"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=..."
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"discovery_date": "2025-12-05T11:00:52.797985+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419139"
}
],
"notes": [
{
"category": "description",
"text": "A configuration override flaw has been discovered in the apache HTTP server. Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: CGI environment variable override",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "RHBZ#2419139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65082"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T10:46:27.138000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:19:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2995"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: CGI environment variable override"
},
{
"cve": "CVE-2025-66200",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"discovery_date": "2025-12-05T12:00:53.623799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419262"
}
],
"notes": [
{
"category": "description",
"text": "A permissions bypass flaw has been discovered in the apache HTTP server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "RHBZ#2419262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66200"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/12/04/8",
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/8"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2025-12-05T11:02:25.722000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:19:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2995"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo"
},
{
"cve": "CVE-2025-69419",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-01-16T14:21:52.793000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. An out-of-bounds write in OpenSSL\u0027s PKCS12_get_friendlyname() function can lead to denial of service or arbitrary code execution. Exploitation requires an application to parse a specially crafted malicious PKCS#12 file. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "RHBZ#2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T19:19:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2995"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, Red Hat recommends avoiding the processing of PKCS#12 files from untrusted or unverified sources. Applications that use the `PKCS12_get_friendlyname()` API should ensure that PKCS#12 files are only processed if they originate from trusted entities. Restricting the input sources for PKCS#12 files can significantly reduce the attack surface for this flaw.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing"
}
]
}
SUSE-SU-2025:4488-1
Vulnerability from csaf_suse - Published: 2025-12-18 17:17 - Updated: 2025-12-18 17:17| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\n- CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511)\n- CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)\n- CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512)\n- CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4488,SUSE-SLE-SERVER-12-SP5-LTSS-2025-4488,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4488",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4488-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4488-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254488-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4488-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254511",
"url": "https://bugzilla.suse.com/1254511"
},
{
"category": "self",
"summary": "SUSE Bug 1254512",
"url": "https://bugzilla.suse.com/1254512"
},
{
"category": "self",
"summary": "SUSE Bug 1254514",
"url": "https://bugzilla.suse.com/1254514"
},
{
"category": "self",
"summary": "SUSE Bug 1254515",
"url": "https://bugzilla.suse.com/1254515"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66200/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2025-12-18T17:17:26Z",
"generator": {
"date": "2025-12-18T17:17:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4488-1",
"initial_release_date": "2025-12-18T17:17:26Z",
"revision_history": [
{
"date": "2025-12-18T17:17:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-2.4.51-35.75.1.aarch64",
"product_id": "apache2-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.aarch64",
"product_id": "apache2-devel-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-event-2.4.51-35.75.1.aarch64",
"product_id": "apache2-event-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.aarch64",
"product_id": "apache2-example-pages-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.aarch64",
"product_id": "apache2-prefork-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.aarch64",
"product_id": "apache2-utils-2.4.51-35.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.aarch64",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.aarch64",
"product_id": "apache2-worker-2.4.51-35.75.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-2.4.51-35.75.1.i586",
"product_id": "apache2-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.i586",
"product_id": "apache2-devel-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-event-2.4.51-35.75.1.i586",
"product_id": "apache2-event-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.i586",
"product_id": "apache2-example-pages-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.i586",
"product_id": "apache2-prefork-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.i586",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.i586",
"product_id": "apache2-utils-2.4.51-35.75.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.i586",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.i586",
"product_id": "apache2-worker-2.4.51-35.75.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.51-35.75.1.noarch",
"product": {
"name": "apache2-doc-2.4.51-35.75.1.noarch",
"product_id": "apache2-doc-2.4.51-35.75.1.noarch"
}
},
{
"category": "product_version",
"name": "apache2-tls13-doc-2.4.51-35.75.1.noarch",
"product": {
"name": "apache2-tls13-doc-2.4.51-35.75.1.noarch",
"product_id": "apache2-tls13-doc-2.4.51-35.75.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-devel-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-event-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-event-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-example-pages-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-prefork-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-utils-2.4.51-35.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.ppc64le",
"product_id": "apache2-worker-2.4.51-35.75.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-2.4.51-35.75.1.s390",
"product_id": "apache2-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.s390",
"product_id": "apache2-devel-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-event-2.4.51-35.75.1.s390",
"product_id": "apache2-event-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.s390",
"product_id": "apache2-example-pages-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.s390",
"product_id": "apache2-prefork-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.s390",
"product_id": "apache2-utils-2.4.51-35.75.1.s390"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.s390",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.s390",
"product_id": "apache2-worker-2.4.51-35.75.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-2.4.51-35.75.1.s390x",
"product_id": "apache2-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.s390x",
"product_id": "apache2-devel-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-event-2.4.51-35.75.1.s390x",
"product_id": "apache2-event-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.s390x",
"product_id": "apache2-example-pages-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.s390x",
"product_id": "apache2-prefork-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390x",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.s390x",
"product_id": "apache2-utils-2.4.51-35.75.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.s390x",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.s390x",
"product_id": "apache2-worker-2.4.51-35.75.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-2.4.51-35.75.1.x86_64",
"product_id": "apache2-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-devel-2.4.51-35.75.1.x86_64",
"product_id": "apache2-devel-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-event-2.4.51-35.75.1.x86_64",
"product_id": "apache2-event-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.51-35.75.1.x86_64",
"product_id": "apache2-example-pages-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.51-35.75.1.x86_64",
"product_id": "apache2-prefork-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-devel-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-event-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-event-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-event-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-utils-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"product_id": "apache2-tls13-worker-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-utils-2.4.51-35.75.1.x86_64",
"product_id": "apache2-utils-2.4.51-35.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.51-35.75.1.x86_64",
"product": {
"name": "apache2-worker-2.4.51-35.75.1.x86_64",
"product_id": "apache2-worker-2.4.51-35.75.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-35.75.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-35.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-doc-2.4.51-35.75.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch"
},
"product_reference": "apache2-tls13-doc-2.4.51-35.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-devel-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.51-35.75.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch"
},
"product_reference": "apache2-doc-2.4.51-35.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-devel-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-doc-2.4.51-35.75.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch"
},
"product_reference": "apache2-tls13-doc-2.4.51-35.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-utils-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-tls13-worker-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-utils-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.51-35.75.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
},
"product_reference": "apache2-worker-2.4.51-35.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55753"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55753",
"url": "https://www.suse.com/security/cve/CVE-2025-55753"
},
{
"category": "external",
"summary": "SUSE Bug 1254511 for CVE-2025-55753",
"url": "https://bugzilla.suse.com/1254511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T17:17:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58098"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=\"...\" directives.\n\nThis issue affects Apache HTTP Server before 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58098",
"url": "https://www.suse.com/security/cve/CVE-2025-58098"
},
{
"category": "external",
"summary": "SUSE Bug 1254512 for CVE-2025-58098",
"url": "https://bugzilla.suse.com/1254512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T17:17:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-65082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65082"
}
],
"notes": [
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.\n\nThis issue affects Apache HTTP Server from 2.4.0 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66 which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65082",
"url": "https://www.suse.com/security/cve/CVE-2025-65082"
},
{
"category": "external",
"summary": "SUSE Bug 1254514 for CVE-2025-65082",
"url": "https://bugzilla.suse.com/1254514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T17:17:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66200"
}
],
"notes": [
{
"category": "general",
"text": "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\n\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66200",
"url": "https://www.suse.com/security/cve/CVE-2025-66200"
},
{
"category": "external",
"summary": "SUSE Bug 1254515 for CVE-2025-66200",
"url": "https://bugzilla.suse.com/1254515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-devel-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-doc-2.4.51-35.75.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-example-pages-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-prefork-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-tls13-worker-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-utils-2.4.51-35.75.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache2-worker-2.4.51-35.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-18T17:17:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-66200"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.