Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-8743 (GCVE-0-2016-8743)
Vulnerability from cvelistv5 – Published: 2017-07-27 21:00 – Updated: 2024-09-16 17:03- Request Smuggling, Response Splitting
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server |
Affected:
2.2.0 to 2.2.31, 2.4.1 to 2.4.23
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T02:34:59.642Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/HT208221"
},
{
"name": "DSA-3796",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "RHSA-2017:1721",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"name": "1037508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "RHSA-2017:1413",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "RHSA-2017:1414",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us"
},
{
"name": "95077",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/95077"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"name": "RHSA-2017:1415",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "RHSA-2017:0906",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"name": "GLSA-201701-36",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888217 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073163 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888221 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073161 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Apache HTTP Server",
"vendor": "Apache Software Foundation",
"versions": [
{
"status": "affected",
"version": "2.2.0 to 2.2.31, 2.4.1 to 2.4.23"
}
]
}
],
"datePublic": "2016-12-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Request Smuggling, Response Splitting",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-06T10:11:24",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/HT208221"
},
{
"name": "DSA-3796",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "RHSA-2017:1721",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"name": "1037508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "RHSA-2017:1413",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "RHSA-2017:1414",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us"
},
{
"name": "95077",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/95077"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"name": "RHSA-2017:1415",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "RHSA-2017:0906",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"name": "GLSA-201701-36",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888217 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073163 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888221 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073161 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2016-12-20T00:00:00",
"ID": "CVE-2016-8743",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value": "2.2.0 to 2.2.31, 2.4.1 to 2.4.23"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Request Smuggling, Response Splitting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT208221",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208221"
},
{
"name": "DSA-3796",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "RHSA-2017:1721",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"name": "1037508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "RHSA-2017:1413",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "RHSA-2017:1414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us"
},
{
"name": "95077",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95077"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"name": "RHSA-2017:1415",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "RHSA-2017:0906",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"name": "GLSA-201701-36",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180423-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888217 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073163 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888221 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073161 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2016-8743",
"datePublished": "2017-07-27T21:00:00Z",
"dateReserved": "2016-10-18T00:00:00",
"dateUpdated": "2024-09-16T17:03:31.158Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-8743\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-07-27T21:29:00.287\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.\"},{\"lang\":\"es\",\"value\":\"El servidor HTTP Apache, en todas las distribuciones anteriores a la 2.2.32 y la 2.4.25 era liberal en el espacio en blanco aceptado de peticiones y enviado en lineas y cabeceras de respuesta. La aceptaci\u00f3n de estos comportamientos diferentes representaba un problema a nivel de seguridad cuando httpd participa en cualquier cadena de proxies o interact\u00faa con servidores de aplicaciones backend, ya sea mediante mod_proxy o utilizando mecanismos CGI convencionales y puede dar lugar al tr\u00e1fico de peticiones, divisi\u00f3n de respuestas y contaminaci\u00f3n de la cach\u00e9.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndIncluding\":\"2.2.31\",\"matchCriteriaId\":\"E3E7037D-2C83-4F09-8DC6-4C51D447727A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.1\",\"versionEndIncluding\":\"2.4.23\",\"matchCriteriaId\":\"8805C987-A5BB-403B-BB9F-B745A2AE7865\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"3FA5E22C-489B-4C5F-A5F3-C03F45CA8811\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807C024A-F8E8-4B48-A349-4C68CD252CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83737173-E12E-4641-BC49-0BD84A6B29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2466282-51AB-478D-9FF4-FA524265ED2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-1415.html\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3796\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/95077\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037508\",\"source\":\"security@apache.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0906\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1161\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1413\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1414\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1721\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/201701-36\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180423-0001/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2017-04\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-1415.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3796\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/95077\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0906\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1414\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201701-36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180423-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2017-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis - Published: 2023-01-23 - Updated: 2023-01-23
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
}
],
"initial_release_date": "2023-01-23T00:00:00",
"last_revision_date": "2023-01-23T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2017-AVI-385
Vulnerability from certfr_avis - Published: 2017-11-02 - Updated: 2017-11-02
De multiples vulnérabilités ont été découvertes dans les produits Apple . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iOS versions antérieures à 11.1 | ||
| Apple | N/A | watchOS versions antérieures à 4.1 | ||
| Apple | macOS | macOS Sierra versions sans le correctif de sécurité 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 11.1 | ||
| Apple | macOS | macOS El Capitan sans le correctif de sécurité 2017-004 | ||
| Apple | N/A | iTunes versions antérieures à 12.7.1 sur Windows | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 7.1 | ||
| Apple | Safari | Safari versions antérieures à 11.0.1 | ||
| Apple | macOS | macOS High Sierra versions antérieures à 10.13.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS versions ant\u00e9rieures \u00e0 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions sans le correctif de s\u00e9curit\u00e9 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le correctif de s\u00e9curit\u00e9 2017-004",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.7.1 sur Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 11.0.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13802",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13802"
},
{
"name": "CVE-2017-13818",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13818"
},
{
"name": "CVE-2017-13052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13052"
},
{
"name": "CVE-2017-12993",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12993"
},
{
"name": "CVE-2017-13018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13018"
},
{
"name": "CVE-2017-13043",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13043"
},
{
"name": "CVE-2017-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
},
{
"name": "CVE-2017-9789",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9789"
},
{
"name": "CVE-2017-7659",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7659"
},
{
"name": "CVE-2016-4736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4736"
},
{
"name": "CVE-2017-13050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13050"
},
{
"name": "CVE-2017-13816",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13816"
},
{
"name": "CVE-2017-13798",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13798"
},
{
"name": "CVE-2017-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11108"
},
{
"name": "CVE-2017-13017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13017"
},
{
"name": "CVE-2017-13831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13831"
},
{
"name": "CVE-2017-11543",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11543"
},
{
"name": "CVE-2017-13790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13790"
},
{
"name": "CVE-2017-13000",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13000"
},
{
"name": "CVE-2017-13807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13807"
},
{
"name": "CVE-2017-13843",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13843"
},
{
"name": "CVE-2017-13055",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13055"
},
{
"name": "CVE-2017-7668",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
},
{
"name": "CVE-2017-13041",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13041"
},
{
"name": "CVE-2017-12902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12902"
},
{
"name": "CVE-2017-13834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13834"
},
{
"name": "CVE-2017-13007",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13007"
},
{
"name": "CVE-2017-13687",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13687"
},
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-12986",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12986"
},
{
"name": "CVE-2017-13821",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13821"
},
{
"name": "CVE-2017-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13033"
},
{
"name": "CVE-2017-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13817"
},
{
"name": "CVE-2017-13799",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13799"
},
{
"name": "CVE-2017-12901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12901"
},
{
"name": "CVE-2017-13832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13832"
},
{
"name": "CVE-2017-13011",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13011"
},
{
"name": "CVE-2017-13046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13046"
},
{
"name": "CVE-2017-13840",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13840"
},
{
"name": "CVE-2017-12897",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12897"
},
{
"name": "CVE-2017-13809",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13809"
},
{
"name": "CVE-2017-13822",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13822"
},
{
"name": "CVE-2017-7113",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7113"
},
{
"name": "CVE-2017-13800",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13800"
},
{
"name": "CVE-2017-13786",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13786"
},
{
"name": "CVE-2017-13003",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13003"
},
{
"name": "CVE-2017-13815",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13815"
},
{
"name": "CVE-2017-13013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13013"
},
{
"name": "CVE-2017-13001",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13001"
},
{
"name": "CVE-2017-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13009"
},
{
"name": "CVE-2017-1000101",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000101"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2017-13048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13048"
},
{
"name": "CVE-2017-13054",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13054"
},
{
"name": "CVE-2017-13038",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13038"
},
{
"name": "CVE-2017-13841",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13841"
},
{
"name": "CVE-2017-13010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13010"
},
{
"name": "CVE-2017-12990",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12990"
},
{
"name": "CVE-2017-13783",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13783"
},
{
"name": "CVE-2017-13047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13047"
},
{
"name": "CVE-2017-12991",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12991"
},
{
"name": "CVE-2017-13805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13805"
},
{
"name": "CVE-2017-13811",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13811"
},
{
"name": "CVE-2017-13849",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13849"
},
{
"name": "CVE-2017-13032",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13032"
},
{
"name": "CVE-2017-13801",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13801"
},
{
"name": "CVE-2017-13051",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13051"
},
{
"name": "CVE-2017-13036",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13036"
},
{
"name": "CVE-2017-9788",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
},
{
"name": "CVE-2017-13844",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13844"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2017-13795",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13795"
},
{
"name": "CVE-2017-13690",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13690"
},
{
"name": "CVE-2017-13838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13838"
},
{
"name": "CVE-2017-11542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11542"
},
{
"name": "CVE-2017-13842",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13842"
},
{
"name": "CVE-2017-12997",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12997"
},
{
"name": "CVE-2017-13045",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13045"
},
{
"name": "CVE-2017-13026",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13026"
},
{
"name": "CVE-2017-13785",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13785"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-13796",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13796"
},
{
"name": "CVE-2017-13782",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13782"
},
{
"name": "CVE-2017-13784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13784"
},
{
"name": "CVE-2017-13042",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13042"
},
{
"name": "CVE-2017-12992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12992"
},
{
"name": "CVE-2017-13027",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13027"
},
{
"name": "CVE-2017-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13034"
},
{
"name": "CVE-2017-13794",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13794"
},
{
"name": "CVE-2017-13015",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13015"
},
{
"name": "CVE-2017-13725",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13725"
},
{
"name": "CVE-2017-13819",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13819"
},
{
"name": "CVE-2017-13044",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13044"
},
{
"name": "CVE-2017-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12900"
},
{
"name": "CVE-2017-12994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12994"
},
{
"name": "CVE-2017-12998",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12998"
},
{
"name": "CVE-2017-13029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13029"
},
{
"name": "CVE-2017-13037",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13037"
},
{
"name": "CVE-2017-13788",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13788"
},
{
"name": "CVE-2017-7132",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7132"
},
{
"name": "CVE-2017-13810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13810"
},
{
"name": "CVE-2017-13039",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13039"
},
{
"name": "CVE-2017-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13791"
},
{
"name": "CVE-2017-13023",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13023"
},
{
"name": "CVE-2017-13020",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13020"
},
{
"name": "CVE-2017-13021",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13021"
},
{
"name": "CVE-2017-3167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
},
{
"name": "CVE-2017-12896",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12896"
},
{
"name": "CVE-2017-13824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13824"
},
{
"name": "CVE-2017-13049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13049"
},
{
"name": "CVE-2017-12999",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12999"
},
{
"name": "CVE-2017-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13836"
},
{
"name": "CVE-2017-13823",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13823"
},
{
"name": "CVE-2017-13846",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13846"
},
{
"name": "CVE-2017-12988",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12988"
},
{
"name": "CVE-2017-13789",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13789"
},
{
"name": "CVE-2017-12985",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12985"
},
{
"name": "CVE-2017-12899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12899"
},
{
"name": "CVE-2017-7679",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
},
{
"name": "CVE-2017-13014",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13014"
},
{
"name": "CVE-2017-12894",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12894"
},
{
"name": "CVE-2017-13804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13804"
},
{
"name": "CVE-2017-13024",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13024"
},
{
"name": "CVE-2017-13004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13004"
},
{
"name": "CVE-2017-12996",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12996"
},
{
"name": "CVE-2017-13830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13830"
},
{
"name": "CVE-2017-12893",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12893"
},
{
"name": "CVE-2017-13019",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13019"
},
{
"name": "CVE-2017-13030",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13030"
},
{
"name": "CVE-2017-13808",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13808"
},
{
"name": "CVE-2017-13813",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13813"
},
{
"name": "CVE-2017-1000100",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000100"
},
{
"name": "CVE-2017-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13053"
},
{
"name": "CVE-2017-13040",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13040"
},
{
"name": "CVE-2017-13689",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13689"
},
{
"name": "CVE-2017-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11103"
},
{
"name": "CVE-2017-13005",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13005"
},
{
"name": "CVE-2017-13793",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13793"
},
{
"name": "CVE-2017-13814",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13814"
},
{
"name": "CVE-2017-12987",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12987"
},
{
"name": "CVE-2017-13826",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13826"
},
{
"name": "CVE-2017-11541",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11541"
},
{
"name": "CVE-2017-13025",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13025"
},
{
"name": "CVE-2017-13828",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13828"
},
{
"name": "CVE-2017-13688",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13688"
},
{
"name": "CVE-2017-13820",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13820"
},
{
"name": "CVE-2017-12995",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12995"
},
{
"name": "CVE-2017-13792",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13792"
},
{
"name": "CVE-2017-13031",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13031"
},
{
"name": "CVE-2017-13028",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13028"
},
{
"name": "CVE-2017-13825",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13825"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-13803",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13803"
},
{
"name": "CVE-2017-13006",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13006"
},
{
"name": "CVE-2017-12895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12895"
},
{
"name": "CVE-2017-13812",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13812"
},
{
"name": "CVE-2017-13022",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13022"
},
{
"name": "CVE-2017-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13012"
},
{
"name": "CVE-2017-13002",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13002"
},
{
"name": "CVE-2017-13035",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13035"
},
{
"name": "CVE-2017-12989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12989"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13016",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13016"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-12898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12898"
},
{
"name": "CVE-2017-13008",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13008"
}
],
"initial_release_date": "2017-11-02T00:00:00",
"last_revision_date": "2017-11-02T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2017-11-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple\n. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208225 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208225"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208222 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208222"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208219 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208219"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208223 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208223"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208220 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208220"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208221 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208221"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208224 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208224"
}
]
}
CERTFR-2017-AVI-231
Vulnerability from certfr_avis - Published: 2017-07-20 - Updated: 2017-07-20
De multiples vulnérabilités ont été corrigées dans Oracle VM Server pour x86 et Oracle Linux. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Linux versions 5, 6 et 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM Server pour x86 versions 3.2, 3.3 et 3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-7895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7895"
},
{
"name": "CVE-2017-7752",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7752"
},
{
"name": "CVE-2017-9524",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9524"
},
{
"name": "CVE-2017-5472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5472"
},
{
"name": "CVE-2017-9462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9462"
},
{
"name": "CVE-2017-7645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7645"
},
{
"name": "CVE-2017-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-6214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6214"
},
{
"name": "CVE-2017-9148",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9148"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7757",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7757"
},
{
"name": "CVE-2017-7758",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7758"
},
{
"name": "CVE-2017-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2583"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2017-1000368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000368"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-7477",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7477"
},
{
"name": "CVE-2017-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7750"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2017-7754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7754"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7749",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7749"
},
{
"name": "CVE-2017-7764",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7764"
},
{
"name": "CVE-2017-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7751"
},
{
"name": "CVE-2017-5470",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5470"
},
{
"name": "CVE-2017-7756",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7756"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
}
],
"initial_release_date": "2017-07-20T00:00:00",
"last_revision_date": "2017-07-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VM Server pour x86 Linux du 17 juillet 2017",
"url": "https://www.oracle.com/technetwork/topics/security/ovmbulletinjul2017-3832369.html"
}
],
"reference": "CERTFR-2017-AVI-231",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-07-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle VM Server pour x86 et Oracle Linux\u003c/span\u003e.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle VM Server pour x86 et Oracle Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle VM Server pour x86 Linux du 17 juillet 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Linux du 17 juillet 2017",
"url": "https://www.oracle.com/technetwork/topics/security/linuxbulletinjul2017-3832368.html"
}
]
}
CERTFR-2017-AVI-092
Vulnerability from certfr_avis - Published: 2017-03-28 - Updated: 2017-03-29
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 3.2 | ||
| Apple | N/A | iOS versions antérieures à 10.3 | ||
| Apple | N/A | Pages versions antérieures à 3.1, Numbers versions antérieures à 3.1 et Keynote versions antérieures à 3.1 pour iOS | ||
| Apple | macOS | macOS Yosemite sans le Security Update 2017-001 | ||
| Apple | macOS | macOS Server versions antérieures à 5.3 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.4 | ||
| Apple | macOS | macOS El Capitan sans le Security Update 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 10.2 | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2 | ||
| Apple | Safari | Safari versions antérieures à 10.1 | ||
| Apple | N/A | Pages versions antérieures à 6.1, Numbers versions antérieures à 4.1 et Keynote versions antérieures à 7.1 pour Mac |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 3.1, Numbers versions ant\u00e9rieures \u00e0 3.1 et Keynote versions ant\u00e9rieures \u00e0 3.1 pour iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Yosemite sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Server versions ant\u00e9rieures \u00e0 5.3",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 6.1, Numbers versions ant\u00e9rieures \u00e0 4.1 et Keynote versions ant\u00e9rieures \u00e0 7.1 pour Mac",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2455"
},
{
"name": "CVE-2016-7922",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7922"
},
{
"name": "CVE-2016-7936",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7936"
},
{
"name": "CVE-2017-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2464"
},
{
"name": "CVE-2017-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2397"
},
{
"name": "CVE-2017-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2414"
},
{
"name": "CVE-2017-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2404"
},
{
"name": "CVE-2017-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2376"
},
{
"name": "CVE-2017-6974",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6974"
},
{
"name": "CVE-2017-5203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5203"
},
{
"name": "CVE-2016-7933",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7933"
},
{
"name": "CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"name": "CVE-2017-5204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5204"
},
{
"name": "CVE-2017-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2400"
},
{
"name": "CVE-2017-5484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5484"
},
{
"name": "CVE-2017-2413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2413"
},
{
"name": "CVE-2017-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2391"
},
{
"name": "CVE-2017-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2420"
},
{
"name": "CVE-2017-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2446"
},
{
"name": "CVE-2016-7993",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7993"
},
{
"name": "CVE-2016-7932",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7932"
},
{
"name": "CVE-2017-2431",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2431"
},
{
"name": "CVE-2017-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2367"
},
{
"name": "CVE-2016-7973",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7973"
},
{
"name": "CVE-2016-8575",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8575"
},
{
"name": "CVE-2017-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2418"
},
{
"name": "CVE-2017-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2412"
},
{
"name": "CVE-2017-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2426"
},
{
"name": "CVE-2017-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2448"
},
{
"name": "CVE-2017-2462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2462"
},
{
"name": "CVE-2016-9540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9540"
},
{
"name": "CVE-2017-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2452"
},
{
"name": "CVE-2017-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2437"
},
{
"name": "CVE-2017-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2423"
},
{
"name": "CVE-2017-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2472"
},
{
"name": "CVE-2016-9643",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9643"
},
{
"name": "CVE-2016-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1001"
},
{
"name": "CVE-2016-8574",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8574"
},
{
"name": "CVE-2017-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2453"
},
{
"name": "CVE-2017-2487",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2487"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2017-2396",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2396"
},
{
"name": "CVE-2017-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2475"
},
{
"name": "CVE-2017-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2481"
},
{
"name": "CVE-2017-5483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5483"
},
{
"name": "CVE-2017-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2440"
},
{
"name": "CVE-2017-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2479"
},
{
"name": "CVE-2017-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2468"
},
{
"name": "CVE-2017-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2388"
},
{
"name": "CVE-2016-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1015"
},
{
"name": "CVE-2017-2458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2458"
},
{
"name": "CVE-2017-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2471"
},
{
"name": "CVE-2016-7975",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7975"
},
{
"name": "CVE-2016-7986",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7986"
},
{
"name": "CVE-2017-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2406"
},
{
"name": "CVE-2017-5485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5485"
},
{
"name": "CVE-2017-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2441"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2443"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2016-7934",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7934"
},
{
"name": "CVE-2017-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2463"
},
{
"name": "CVE-2017-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2392"
},
{
"name": "CVE-2016-9533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9533"
},
{
"name": "CVE-2017-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2428"
},
{
"name": "CVE-2016-7928",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7928"
},
{
"name": "CVE-2017-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2439"
},
{
"name": "CVE-2017-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2408"
},
{
"name": "CVE-2017-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2390"
},
{
"name": "CVE-2016-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0751"
},
{
"name": "CVE-2017-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2449"
},
{
"name": "CVE-2016-7927",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7927"
},
{
"name": "CVE-2017-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2383"
},
{
"name": "CVE-2017-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2483"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2016-9536",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9536"
},
{
"name": "CVE-2017-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2486"
},
{
"name": "CVE-2017-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2465"
},
{
"name": "CVE-2017-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2422"
},
{
"name": "CVE-2016-7974",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7974"
},
{
"name": "CVE-2017-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2425"
},
{
"name": "CVE-2017-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5341"
},
{
"name": "CVE-2017-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2399"
},
{
"name": "CVE-2017-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2389"
},
{
"name": "CVE-2017-2485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2485"
},
{
"name": "CVE-2016-7935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7935"
},
{
"name": "CVE-2017-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2478"
},
{
"name": "CVE-2017-2467",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2467"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2435"
},
{
"name": "CVE-2016-9537",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9537"
},
{
"name": "CVE-2017-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2407"
},
{
"name": "CVE-2017-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2385"
},
{
"name": "CVE-2017-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2424"
},
{
"name": "CVE-2017-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2436"
},
{
"name": "CVE-2017-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2454"
},
{
"name": "CVE-2016-7984",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7984"
},
{
"name": "CVE-2016-7585",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7585"
},
{
"name": "CVE-2016-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9935"
},
{
"name": "CVE-2016-7931",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7931"
},
{
"name": "CVE-2017-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2378"
},
{
"name": "CVE-2016-7939",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7939"
},
{
"name": "CVE-2017-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2377"
},
{
"name": "CVE-2017-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2402"
},
{
"name": "CVE-2017-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2427"
},
{
"name": "CVE-2017-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2473"
},
{
"name": "CVE-2017-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2398"
},
{
"name": "CVE-2017-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2469"
},
{
"name": "CVE-2016-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3619"
},
{
"name": "CVE-2017-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2459"
},
{
"name": "CVE-2017-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2386"
},
{
"name": "CVE-2017-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2401"
},
{
"name": "CVE-2016-7923",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7923"
},
{
"name": "CVE-2017-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2419"
},
{
"name": "CVE-2017-2474",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2474"
},
{
"name": "CVE-2016-7985",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7985"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2409"
},
{
"name": "CVE-2016-7992",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7992"
},
{
"name": "CVE-2017-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2380"
},
{
"name": "CVE-2017-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2484"
},
{
"name": "CVE-2017-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2466"
},
{
"name": "CVE-2017-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2393"
},
{
"name": "CVE-2017-2395",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2395"
},
{
"name": "CVE-2017-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2445"
},
{
"name": "CVE-2016-7929",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7929"
},
{
"name": "CVE-2017-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2442"
},
{
"name": "CVE-2017-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2416"
},
{
"name": "CVE-2017-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2444"
},
{
"name": "CVE-2017-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2364"
},
{
"name": "CVE-2017-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5342"
},
{
"name": "CVE-2017-2415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2415"
},
{
"name": "CVE-2017-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2379"
},
{
"name": "CVE-2017-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2457"
},
{
"name": "CVE-2017-2434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2434"
},
{
"name": "CVE-2017-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2382"
},
{
"name": "CVE-2017-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2381"
},
{
"name": "CVE-2017-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2410"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2421"
},
{
"name": "CVE-2017-5205",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5205"
},
{
"name": "CVE-2016-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7940"
},
{
"name": "CVE-2017-2438",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2438"
},
{
"name": "CVE-2017-2460",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2460"
},
{
"name": "CVE-2017-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5482"
},
{
"name": "CVE-2016-7926",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7926"
},
{
"name": "CVE-2017-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2403"
},
{
"name": "CVE-2017-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2461"
},
{
"name": "CVE-2017-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2384"
},
{
"name": "CVE-2017-5486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5486"
},
{
"name": "CVE-2016-7937",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7937"
},
{
"name": "CVE-2016-7983",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7983"
},
{
"name": "CVE-2016-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1016"
},
{
"name": "CVE-2016-9642",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9642"
},
{
"name": "CVE-2016-7925",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7925"
},
{
"name": "CVE-2017-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2405"
},
{
"name": "CVE-2017-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2417"
},
{
"name": "CVE-2017-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2447"
},
{
"name": "CVE-2017-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2482"
},
{
"name": "CVE-2017-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2451"
},
{
"name": "CVE-2017-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2430"
},
{
"name": "CVE-2016-7930",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7930"
},
{
"name": "CVE-2017-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2456"
},
{
"name": "CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"name": "CVE-2017-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2432"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2470"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2017-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2476"
},
{
"name": "CVE-2016-7938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7938"
},
{
"name": "CVE-2017-5202",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5202"
},
{
"name": "CVE-2016-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000"
},
{
"name": "CVE-2017-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2433"
},
{
"name": "CVE-2017-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2450"
},
{
"name": "CVE-2017-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2480"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2016-7924",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7924"
},
{
"name": "CVE-2017-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2429"
},
{
"name": "CVE-2017-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2394"
}
],
"initial_release_date": "2017-03-28T00:00:00",
"last_revision_date": "2017-03-29T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-28T00:00:00.000000"
},
{
"description": "ajout des informations li\u00e9es au bulletin de s\u00e9curit\u00e9 HT207607.",
"revision_date": "2017-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207604 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207607 du 28 mars 2017",
"url": "https://support.apple.com/en-us/HT207607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207615 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207602 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207600 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207595 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207601 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207617 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207617"
}
]
}
CERTFR-2018-AVI-026
Vulnerability from certfr_avis - Published: 2018-01-11 - Updated: 2018-01-11
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D232 sur QFX5200/5110 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 antérieures à 17.1R2-S5, 17.1R3 et 17.1R3 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R6 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D70, 15.1X53-D231 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1 antérieures à 14.1R9 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R2, 16.2R2-S2, 16.2R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R8 | ||
| N/A | N/A | CTPView versions 7.1, 7.2 et 7.3. | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1R6-S2, 15.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R5-S1, 16.1R6 | ||
| Juniper Networks | Junos Space | Junos Space antérieures à 17.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R3 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 versions 15.1X49-D100 et supérieures mais antérieures à 15.1X49-D121 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 antérieures à 14.1X53-D40 sur QFX, EX | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R8 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 antérieures à 12.1X46-D71 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D110 sur SRX | ||
| N/A | N/A | ScreenOS toutes versions sans le dernier correctif de sécurité | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1X65 antérieures à 16.1X65-D45 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1 antérieures à 14.1R8-S5, 14.1R9 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D55 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1R5-S4, 15.1R5-S5 et 15.1R6 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 antérieures à 12.1X46-D71 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3 antérieures à 12.3R12-S7 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 antérieures à 14.1X53-D46, 14.1X53-D50 et 14.1X53-D107 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3R antérieures à 12.3R12-S7 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D55 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3R12 antérieures à 12.3R12-S7 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions 12.3X48-D55 et supérieures mais antérieures à 12.3X48-D65 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 antérieures à 17.2X75-D50 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D49, 15.1X53-D470 sur NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D65 sur QFX10K | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R3-S6, 16.1R4-S6 et 16.1R5 | ||
| ESET | Security | Security Director et Log Collector antérieures à 17.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R7-S9, 14.2R8 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D232 sur QFX5200/5110",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 ant\u00e9rieures \u00e0 17.1R2-S5, 17.1R3 et 17.1R3 sur MX series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R6 sur MX series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D70, 15.1X53-D231",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R9 sur MX series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R2, 16.2R2-S2, 16.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPView versions 7.1, 7.2 et 7.3.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R6-S2, 15.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R5-S1, 16.1R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space ant\u00e9rieures \u00e0 17.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 sur MX series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R3 sur MX series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 versions 15.1X49-D100 et sup\u00e9rieures mais ant\u00e9rieures \u00e0 15.1X49-D121",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D40 sur QFX, EX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8 sur MX series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D71",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D110 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "ScreenOS toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1X65 ant\u00e9rieures \u00e0 16.1X65-D45",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R8-S5, 14.1R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1R5-S4, 15.1R5-S5 et 15.1R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D71 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3 ant\u00e9rieures \u00e0 12.3R12-S7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D46, 14.1X53-D50 et 14.1X53-D107",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3R ant\u00e9rieures \u00e0 12.3R12-S7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3R12 ant\u00e9rieures \u00e0 12.3R12-S7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 versions 12.3X48-D55 et sup\u00e9rieures mais ant\u00e9rieures \u00e0 12.3X48-D65",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 ant\u00e9rieures \u00e0 17.2X75-D50",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D49, 15.1X53-D470 sur NFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D65 sur QFX10K",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R3-S6, 16.1R4-S6 et 16.1R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director et Log Collector ant\u00e9rieures \u00e0 17.2R1",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R7-S9, 14.2R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
},
{
"name": "CVE-2017-14106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
},
{
"name": "CVE-2018-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0002"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2018-0008",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0008"
},
{
"name": "CVE-2015-6563",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6563"
},
{
"name": "CVE-2018-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0013"
},
{
"name": "CVE-2015-6564",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6564"
},
{
"name": "CVE-2015-7236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7236"
},
{
"name": "CVE-2017-7668",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
},
{
"name": "CVE-2017-9798",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
},
{
"name": "CVE-2018-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0011"
},
{
"name": "CVE-2016-2141",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2141"
},
{
"name": "CVE-2015-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7501"
},
{
"name": "CVE-2015-5304",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5304"
},
{
"name": "CVE-2018-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0012"
},
{
"name": "CVE-2018-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0003"
},
{
"name": "CVE-2017-9788",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
},
{
"name": "CVE-2015-5174",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5174"
},
{
"name": "CVE-2017-1000112",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000112"
},
{
"name": "CVE-2016-8858",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8858"
},
{
"name": "CVE-2017-5664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5664"
},
{
"name": "CVE-2017-1000111",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000111"
},
{
"name": "CVE-2017-6074",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6074"
},
{
"name": "CVE-2017-5645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5645"
},
{
"name": "CVE-2018-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0010"
},
{
"name": "CVE-2018-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0005"
},
{
"name": "CVE-2018-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0007"
},
{
"name": "CVE-2016-8655",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8655"
},
{
"name": "CVE-2017-3167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
},
{
"name": "CVE-2015-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5188"
},
{
"name": "CVE-2018-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0009"
},
{
"name": "CVE-2017-7679",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
},
{
"name": "CVE-2018-0004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0004"
},
{
"name": "CVE-2018-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0014"
},
{
"name": "CVE-2017-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2634"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2015-5220",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5220"
},
{
"name": "CVE-2018-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0006"
},
{
"name": "CVE-2018-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0001"
}
],
"initial_release_date": "2018-01-11T00:00:00",
"last_revision_date": "2018-01-11T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-026",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10838 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10838\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10831 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10831\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10835 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10835\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10833 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10833\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10837 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10837\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10841 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10841\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10828 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10828\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10834 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10834\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10829 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10829\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10836 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10836\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10839 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10839\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10830 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10830\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10832 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10832\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10840 du 10 janvier 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10840\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2017-AVI-121
Vulnerability from certfr_avis - Published: 2017-04-19 - Updated: 2017-04-19
De multiples vulnérabilités ont été corrigées dans Oracle Linux and Virtualization. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Virtualization | Oracle Secure Global Desktop version 5.3 | ||
| Oracle | Virtualization | Oracle VM VirtualBox versions 5.1.x antérieures à 5.1.20 | ||
| Oracle | Virtualization | Oracle Secure Global Desktop version 5.2 | ||
| Oracle | Virtualization | Oracle VM VirtualBox versions 5.0.x antérieures à 5.0.38 | ||
| Oracle | Virtualization | Oracle Secure Global Desktop version 4.71 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Secure Global Desktop version 5.3",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM VirtualBox versions 5.1.x ant\u00e9rieures \u00e0 5.1.20",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Secure Global Desktop version 5.2",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM VirtualBox versions 5.0.x ant\u00e9rieures \u00e0 5.0.38",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Secure Global Desktop version 4.71",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3563"
},
{
"name": "CVE-2016-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5407"
},
{
"name": "CVE-2017-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3731"
},
{
"name": "CVE-2013-1982",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1982"
},
{
"name": "CVE-2017-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3587"
},
{
"name": "CVE-2016-3739",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3739"
},
{
"name": "CVE-2017-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3576"
},
{
"name": "CVE-2017-3513",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3513"
},
{
"name": "CVE-2017-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3558"
},
{
"name": "CVE-2016-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0762"
},
{
"name": "CVE-2017-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3561"
},
{
"name": "CVE-2017-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3559"
},
{
"name": "CVE-2017-3575",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3575"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-3538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3538"
}
],
"initial_release_date": "2017-04-19T00:00:00",
"last_revision_date": "2017-04-19T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2017-3236618 du 18 avril 2017",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2017verbose-3236619 du 18 avril 2017",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017verbose-3236619.html#OVIR"
}
],
"reference": "CERTFR-2017-AVI-121",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-04-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Linux and Virtualization\u003c/span\u003e. Certaines d\u0027entre\nelles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Linux and Virtualization",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2017verbose-3236619 du 18 avril 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2017-3236618 du 18 avril 2017",
"url": null
}
]
}
SUSE-SU-2018:2815-1
Vulnerability from csaf_suse - Published: 2018-09-24 06:07 - Updated: 2018-09-24 06:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests\n and sent in response lines and headers. Accepting these different behaviors\n represented a security concern when httpd participates in any chain of\n proxies or interacts with back-end application servers, either through\n mod_proxy or using conventional CGI mechanisms, and may result in request\n smuggling, response splitting and cache pollution. (bsc#1016715)\n- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting\n attacks for sites which use mod_userdir. This issue was mitigated by changes\n which prohibit CR or LF injection into the \u0027Location\u0027 or other outbound\n header key or value. (bsc#1104826)\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-1970,SUSE-SLE-SAP-12-SP2-2018-1970,SUSE-SLE-SDK-12-SP3-2018-1970,SUSE-SLE-SERVER-12-SP2-2018-1970,SUSE-SLE-SERVER-12-SP3-2018-1970,SUSE-Storage-4-2018-1970",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2815-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2815-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182815-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2815-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004583.html"
},
{
"category": "self",
"summary": "SUSE Bug 1016715",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "self",
"summary": "SUSE Bug 1104826",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4975 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8743 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8743/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2018-09-24T06:07:56Z",
"generator": {
"date": "2018-09-24T06:07:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2815-1",
"initial_release_date": "2018-09-24T06:07:56Z",
"revision_history": [
{
"date": "2018-09-24T06:07:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.4.23-29.24.1.aarch64",
"product": {
"name": "apache2-devel-2.4.23-29.24.1.aarch64",
"product_id": "apache2-devel-2.4.23-29.24.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-2.4.23-29.24.1.aarch64",
"product": {
"name": "apache2-2.4.23-29.24.1.aarch64",
"product_id": "apache2-2.4.23-29.24.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-29.24.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.23-29.24.1.aarch64",
"product_id": "apache2-example-pages-2.4.23-29.24.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-29.24.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.23-29.24.1.aarch64",
"product_id": "apache2-prefork-2.4.23-29.24.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-29.24.1.aarch64",
"product": {
"name": "apache2-utils-2.4.23-29.24.1.aarch64",
"product_id": "apache2-utils-2.4.23-29.24.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-29.24.1.aarch64",
"product": {
"name": "apache2-worker-2.4.23-29.24.1.aarch64",
"product_id": "apache2-worker-2.4.23-29.24.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.23-29.24.1.noarch",
"product": {
"name": "apache2-doc-2.4.23-29.24.1.noarch",
"product_id": "apache2-doc-2.4.23-29.24.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-29.24.1.ppc64le",
"product": {
"name": "apache2-2.4.23-29.24.1.ppc64le",
"product_id": "apache2-2.4.23-29.24.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-29.24.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.23-29.24.1.ppc64le",
"product_id": "apache2-example-pages-2.4.23-29.24.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-29.24.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.23-29.24.1.ppc64le",
"product_id": "apache2-prefork-2.4.23-29.24.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-29.24.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.23-29.24.1.ppc64le",
"product_id": "apache2-utils-2.4.23-29.24.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-29.24.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.23-29.24.1.ppc64le",
"product_id": "apache2-worker-2.4.23-29.24.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.23-29.24.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.23-29.24.1.ppc64le",
"product_id": "apache2-devel-2.4.23-29.24.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-29.24.1.s390x",
"product": {
"name": "apache2-2.4.23-29.24.1.s390x",
"product_id": "apache2-2.4.23-29.24.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-29.24.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.23-29.24.1.s390x",
"product_id": "apache2-example-pages-2.4.23-29.24.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-29.24.1.s390x",
"product": {
"name": "apache2-prefork-2.4.23-29.24.1.s390x",
"product_id": "apache2-prefork-2.4.23-29.24.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-29.24.1.s390x",
"product": {
"name": "apache2-utils-2.4.23-29.24.1.s390x",
"product_id": "apache2-utils-2.4.23-29.24.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-29.24.1.s390x",
"product": {
"name": "apache2-worker-2.4.23-29.24.1.s390x",
"product_id": "apache2-worker-2.4.23-29.24.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.23-29.24.1.s390x",
"product": {
"name": "apache2-devel-2.4.23-29.24.1.s390x",
"product_id": "apache2-devel-2.4.23-29.24.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-2.4.23-29.24.1.x86_64",
"product_id": "apache2-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"product_id": "apache2-example-pages-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64",
"product_id": "apache2-prefork-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64",
"product_id": "apache2-utils-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64",
"product_id": "apache2-worker-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-devel-2.4.23-29.24.1.x86_64",
"product_id": "apache2-devel-2.4.23-29.24.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-29.24.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.24.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-29.24.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-29.24.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.24.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-29.24.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-devel-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-devel-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-devel-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-29.24.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.24.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-29.24.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-29.24.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.24.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-29.24.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-29.24.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.24.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-29.24.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.s390x"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:apache2-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-29.24.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.24.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-29.24.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4975"
}
],
"notes": [
{
"category": "general",
"text": "Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:apache2-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4975",
"url": "https://www.suse.com/security/cve/CVE-2016-4975"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-4975",
"url": "https://bugzilla.suse.com/1104826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:apache2-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:apache2-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-24T06:07:56Z",
"details": "low"
}
],
"title": "CVE-2016-4975"
},
{
"cve": "CVE-2016-8743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8743"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:apache2-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8743",
"url": "https://www.suse.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "SUSE Bug 1016715 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1033513"
},
{
"category": "external",
"summary": "SUSE Bug 1086774 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1086774"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "external",
"summary": "SUSE Bug 930944 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/930944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:apache2-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 4:apache2-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.s390x",
"SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-24T06:07:56Z",
"details": "moderate"
}
],
"title": "CVE-2016-8743"
}
]
}
SUSE-SU-2018:2554-1
Vulnerability from csaf_suse - Published: 2018-08-30 06:44 - Updated: 2018-08-30 06:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests\n and sent in response lines and headers. Accepting these different behaviors\n represented a security concern when httpd participates in any chain of\n proxies or interacts with back-end application servers, either through\n mod_proxy or using conventional CGI mechanisms, and may result in request\n smuggling, response splitting and cache pollution. (bsc#1016715)\n- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting\n attacks for sites which use mod_userdir. This issue was mitigated by changes\n which prohibit CR or LF injection into the \u0027Location\u0027 or other outbound\n header key or value. (bsc#1104826)\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-1791,SUSE-SLE-SERVER-12-SP1-2018-1791",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2554-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2554-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182554-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2554-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004509.html"
},
{
"category": "self",
"summary": "SUSE Bug 1016715",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "self",
"summary": "SUSE Bug 1104826",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4975 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8743 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8743/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2018-08-30T06:44:40Z",
"generator": {
"date": "2018-08-30T06:44:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2554-1",
"initial_release_date": "2018-08-30T06:44:40Z",
"revision_history": [
{
"date": "2018-08-30T06:44:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.16-20.19.1.noarch",
"product": {
"name": "apache2-doc-2.4.16-20.19.1.noarch",
"product_id": "apache2-doc-2.4.16-20.19.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.16-20.19.1.ppc64le",
"product": {
"name": "apache2-2.4.16-20.19.1.ppc64le",
"product_id": "apache2-2.4.16-20.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.16-20.19.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.16-20.19.1.ppc64le",
"product_id": "apache2-example-pages-2.4.16-20.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.16-20.19.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.16-20.19.1.ppc64le",
"product_id": "apache2-prefork-2.4.16-20.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.16-20.19.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.16-20.19.1.ppc64le",
"product_id": "apache2-utils-2.4.16-20.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.16-20.19.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.16-20.19.1.ppc64le",
"product_id": "apache2-worker-2.4.16-20.19.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.16-20.19.1.s390x",
"product": {
"name": "apache2-2.4.16-20.19.1.s390x",
"product_id": "apache2-2.4.16-20.19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.16-20.19.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.16-20.19.1.s390x",
"product_id": "apache2-example-pages-2.4.16-20.19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.16-20.19.1.s390x",
"product": {
"name": "apache2-prefork-2.4.16-20.19.1.s390x",
"product_id": "apache2-prefork-2.4.16-20.19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.16-20.19.1.s390x",
"product": {
"name": "apache2-utils-2.4.16-20.19.1.s390x",
"product_id": "apache2-utils-2.4.16-20.19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.16-20.19.1.s390x",
"product": {
"name": "apache2-worker-2.4.16-20.19.1.s390x",
"product_id": "apache2-worker-2.4.16-20.19.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.16-20.19.1.x86_64",
"product": {
"name": "apache2-2.4.16-20.19.1.x86_64",
"product_id": "apache2-2.4.16-20.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.16-20.19.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.16-20.19.1.x86_64",
"product_id": "apache2-example-pages-2.4.16-20.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.16-20.19.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.16-20.19.1.x86_64",
"product_id": "apache2-prefork-2.4.16-20.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.16-20.19.1.x86_64",
"product": {
"name": "apache2-utils-2.4.16-20.19.1.x86_64",
"product_id": "apache2-utils-2.4.16-20.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.16-20.19.1.x86_64",
"product": {
"name": "apache2-worker-2.4.16-20.19.1.x86_64",
"product_id": "apache2-worker-2.4.16-20.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.16-20.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1.noarch"
},
"product_reference": "apache2-doc-2.4.16-20.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-utils-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-worker-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-20.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.s390x"
},
"product_reference": "apache2-2.4.16-20.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.16-20.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1.noarch"
},
"product_reference": "apache2-doc-2.4.16-20.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-20.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.16-20.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-20.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.s390x"
},
"product_reference": "apache2-prefork-2.4.16-20.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-20.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.s390x"
},
"product_reference": "apache2-utils-2.4.16-20.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-utils-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-20.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.16-20.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-20.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.s390x"
},
"product_reference": "apache2-worker-2.4.16-20.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-20.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.x86_64"
},
"product_reference": "apache2-worker-2.4.16-20.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4975"
}
],
"notes": [
{
"category": "general",
"text": "Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4975",
"url": "https://www.suse.com/security/cve/CVE-2016-4975"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-4975",
"url": "https://bugzilla.suse.com/1104826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-30T06:44:40Z",
"details": "low"
}
],
"title": "CVE-2016-4975"
},
{
"cve": "CVE-2016-8743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8743"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8743",
"url": "https://www.suse.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "SUSE Bug 1016715 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1033513"
},
{
"category": "external",
"summary": "SUSE Bug 1086774 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1086774"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "external",
"summary": "SUSE Bug 930944 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/930944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-30T06:44:40Z",
"details": "moderate"
}
],
"title": "CVE-2016-8743"
}
]
}
SUSE-SU-2018:2815-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:50 - Updated: 2018-10-18 12:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for apache2 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests\n and sent in response lines and headers. Accepting these different behaviors\n represented a security concern when httpd participates in any chain of\n proxies or interacts with back-end application servers, either through\n mod_proxy or using conventional CGI mechanisms, and may result in request\n smuggling, response splitting and cache pollution. (bsc#1016715)\n- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting\n attacks for sites which use mod_userdir. This issue was mitigated by changes\n which prohibit CR or LF injection into the \u0027Location\u0027 or other outbound\n header key or value. (bsc#1104826)\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1970",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2815-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2815-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182815-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2815-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004718.html"
},
{
"category": "self",
"summary": "SUSE Bug 1016715",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "self",
"summary": "SUSE Bug 1104826",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4975 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8743 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8743/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2018-10-18T12:50:21Z",
"generator": {
"date": "2018-10-18T12:50:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2815-2",
"initial_release_date": "2018-10-18T12:50:21Z",
"revision_history": [
{
"date": "2018-10-18T12:50:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.23-29.24.1.noarch",
"product": {
"name": "apache2-doc-2.4.23-29.24.1.noarch",
"product_id": "apache2-doc-2.4.23-29.24.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-2.4.23-29.24.1.x86_64",
"product_id": "apache2-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"product_id": "apache2-example-pages-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64",
"product_id": "apache2-prefork-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64",
"product_id": "apache2-utils-2.4.23-29.24.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-29.24.1.x86_64",
"product": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64",
"product_id": "apache2-worker-2.4.23-29.24.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-29.24.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.24.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-29.24.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-29.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.24.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-29.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4975"
}
],
"notes": [
{
"category": "general",
"text": "Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4975",
"url": "https://www.suse.com/security/cve/CVE-2016-4975"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-4975",
"url": "https://bugzilla.suse.com/1104826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:50:21Z",
"details": "low"
}
],
"title": "CVE-2016-4975"
},
{
"cve": "CVE-2016-8743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8743"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8743",
"url": "https://www.suse.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "SUSE Bug 1016715 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1033513"
},
{
"category": "external",
"summary": "SUSE Bug 1086774 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1086774"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "external",
"summary": "SUSE Bug 930944 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/930944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.24.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.24.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:50:21Z",
"details": "moderate"
}
],
"title": "CVE-2016-8743"
}
]
}
SUSE-SU-2017:0729-1
Vulnerability from csaf_suse - Published: 2017-03-17 13:58 - Updated: 2017-03-17 13:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for apache2 fixes the following issues:\n\nSecurity issues fixed:\n- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash,\n resulting in DoS (bsc#1016714).\n- CVE-2016-8743: Added new directive \u0027HttpProtocolOptions Strict\u0027 to avoid proxy chain\n misinterpretation (bsc#1016715).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-apache2-13032,slessp4-apache2-13032,slestso13-apache2-13032",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0729-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0729-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170729-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0729-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002710.html"
},
{
"category": "self",
"summary": "SUSE Bug 1016714",
"url": "https://bugzilla.suse.com/1016714"
},
{
"category": "self",
"summary": "SUSE Bug 1016715",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2161 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8743 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8743/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2017-03-17T13:58:38Z",
"generator": {
"date": "2017-03-17T13:58:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0729-1",
"initial_release_date": "2017-03-17T13:58:38Z",
"revision_history": [
{
"date": "2017-03-17T13:58:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.2.12-69.1.i586",
"product": {
"name": "apache2-2.2.12-69.1.i586",
"product_id": "apache2-2.2.12-69.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.2.12-69.1.i586",
"product": {
"name": "apache2-devel-2.2.12-69.1.i586",
"product_id": "apache2-devel-2.2.12-69.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.2.12-69.1.i586",
"product": {
"name": "apache2-doc-2.2.12-69.1.i586",
"product_id": "apache2-doc-2.2.12-69.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.2.12-69.1.i586",
"product": {
"name": "apache2-example-pages-2.2.12-69.1.i586",
"product_id": "apache2-example-pages-2.2.12-69.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.2.12-69.1.i586",
"product": {
"name": "apache2-prefork-2.2.12-69.1.i586",
"product_id": "apache2-prefork-2.2.12-69.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.2.12-69.1.i586",
"product": {
"name": "apache2-utils-2.2.12-69.1.i586",
"product_id": "apache2-utils-2.2.12-69.1.i586"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.2.12-69.1.i586",
"product": {
"name": "apache2-worker-2.2.12-69.1.i586",
"product_id": "apache2-worker-2.2.12-69.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.2.12-69.1.ia64",
"product": {
"name": "apache2-devel-2.2.12-69.1.ia64",
"product_id": "apache2-devel-2.2.12-69.1.ia64"
}
},
{
"category": "product_version",
"name": "apache2-2.2.12-69.1.ia64",
"product": {
"name": "apache2-2.2.12-69.1.ia64",
"product_id": "apache2-2.2.12-69.1.ia64"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.2.12-69.1.ia64",
"product": {
"name": "apache2-doc-2.2.12-69.1.ia64",
"product_id": "apache2-doc-2.2.12-69.1.ia64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.2.12-69.1.ia64",
"product": {
"name": "apache2-example-pages-2.2.12-69.1.ia64",
"product_id": "apache2-example-pages-2.2.12-69.1.ia64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.2.12-69.1.ia64",
"product": {
"name": "apache2-prefork-2.2.12-69.1.ia64",
"product_id": "apache2-prefork-2.2.12-69.1.ia64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.2.12-69.1.ia64",
"product": {
"name": "apache2-utils-2.2.12-69.1.ia64",
"product_id": "apache2-utils-2.2.12-69.1.ia64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.2.12-69.1.ia64",
"product": {
"name": "apache2-worker-2.2.12-69.1.ia64",
"product_id": "apache2-worker-2.2.12-69.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.2.12-69.1.ppc64",
"product": {
"name": "apache2-devel-2.2.12-69.1.ppc64",
"product_id": "apache2-devel-2.2.12-69.1.ppc64"
}
},
{
"category": "product_version",
"name": "apache2-2.2.12-69.1.ppc64",
"product": {
"name": "apache2-2.2.12-69.1.ppc64",
"product_id": "apache2-2.2.12-69.1.ppc64"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.2.12-69.1.ppc64",
"product": {
"name": "apache2-doc-2.2.12-69.1.ppc64",
"product_id": "apache2-doc-2.2.12-69.1.ppc64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.2.12-69.1.ppc64",
"product": {
"name": "apache2-example-pages-2.2.12-69.1.ppc64",
"product_id": "apache2-example-pages-2.2.12-69.1.ppc64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.2.12-69.1.ppc64",
"product": {
"name": "apache2-prefork-2.2.12-69.1.ppc64",
"product_id": "apache2-prefork-2.2.12-69.1.ppc64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.2.12-69.1.ppc64",
"product": {
"name": "apache2-utils-2.2.12-69.1.ppc64",
"product_id": "apache2-utils-2.2.12-69.1.ppc64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.2.12-69.1.ppc64",
"product": {
"name": "apache2-worker-2.2.12-69.1.ppc64",
"product_id": "apache2-worker-2.2.12-69.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.2.12-69.1.s390x",
"product": {
"name": "apache2-devel-2.2.12-69.1.s390x",
"product_id": "apache2-devel-2.2.12-69.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-2.2.12-69.1.s390x",
"product": {
"name": "apache2-2.2.12-69.1.s390x",
"product_id": "apache2-2.2.12-69.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.2.12-69.1.s390x",
"product": {
"name": "apache2-doc-2.2.12-69.1.s390x",
"product_id": "apache2-doc-2.2.12-69.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.2.12-69.1.s390x",
"product": {
"name": "apache2-example-pages-2.2.12-69.1.s390x",
"product_id": "apache2-example-pages-2.2.12-69.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.2.12-69.1.s390x",
"product": {
"name": "apache2-prefork-2.2.12-69.1.s390x",
"product_id": "apache2-prefork-2.2.12-69.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.2.12-69.1.s390x",
"product": {
"name": "apache2-utils-2.2.12-69.1.s390x",
"product_id": "apache2-utils-2.2.12-69.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.2.12-69.1.s390x",
"product": {
"name": "apache2-worker-2.2.12-69.1.s390x",
"product_id": "apache2-worker-2.2.12-69.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.2.12-69.1.x86_64",
"product": {
"name": "apache2-2.2.12-69.1.x86_64",
"product_id": "apache2-2.2.12-69.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.2.12-69.1.x86_64",
"product": {
"name": "apache2-devel-2.2.12-69.1.x86_64",
"product_id": "apache2-devel-2.2.12-69.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.2.12-69.1.x86_64",
"product": {
"name": "apache2-doc-2.2.12-69.1.x86_64",
"product_id": "apache2-doc-2.2.12-69.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.2.12-69.1.x86_64",
"product": {
"name": "apache2-example-pages-2.2.12-69.1.x86_64",
"product_id": "apache2-example-pages-2.2.12-69.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.2.12-69.1.x86_64",
"product": {
"name": "apache2-prefork-2.2.12-69.1.x86_64",
"product_id": "apache2-prefork-2.2.12-69.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.2.12-69.1.x86_64",
"product": {
"name": "apache2-utils-2.2.12-69.1.x86_64",
"product_id": "apache2-utils-2.2.12-69.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.2.12-69.1.x86_64",
"product": {
"name": "apache2-worker-2.2.12-69.1.x86_64",
"product_id": "apache2-worker-2.2.12-69.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Studio Onsite 1.3",
"product": {
"name": "SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-studioonsite:1.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.i586"
},
"product_reference": "apache2-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.i586"
},
"product_reference": "apache2-devel-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ia64"
},
"product_reference": "apache2-devel-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-devel-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.s390x"
},
"product_reference": "apache2-devel-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-devel-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.i586"
},
"product_reference": "apache2-doc-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-doc-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.i586"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.i586"
},
"product_reference": "apache2-prefork-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-prefork-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.i586"
},
"product_reference": "apache2-utils-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-utils-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.i586"
},
"product_reference": "apache2-worker-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-worker-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.i586"
},
"product_reference": "apache2-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ia64"
},
"product_reference": "apache2-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.s390x"
},
"product_reference": "apache2-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.i586"
},
"product_reference": "apache2-doc-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ia64"
},
"product_reference": "apache2-doc-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-doc-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.s390x"
},
"product_reference": "apache2-doc-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-doc-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.i586"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ia64"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.s390x"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.i586"
},
"product_reference": "apache2-prefork-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ia64"
},
"product_reference": "apache2-prefork-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-prefork-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.s390x"
},
"product_reference": "apache2-prefork-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-prefork-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.i586"
},
"product_reference": "apache2-utils-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ia64"
},
"product_reference": "apache2-utils-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-utils-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.s390x"
},
"product_reference": "apache2-utils-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-utils-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.i586"
},
"product_reference": "apache2-worker-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ia64"
},
"product_reference": "apache2-worker-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-worker-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.s390x"
},
"product_reference": "apache2-worker-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-worker-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.i586"
},
"product_reference": "apache2-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ia64"
},
"product_reference": "apache2-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.s390x"
},
"product_reference": "apache2-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.i586"
},
"product_reference": "apache2-doc-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ia64"
},
"product_reference": "apache2-doc-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-doc-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.s390x"
},
"product_reference": "apache2-doc-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-doc-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.i586"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ia64"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.s390x"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-example-pages-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.i586"
},
"product_reference": "apache2-prefork-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ia64"
},
"product_reference": "apache2-prefork-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-prefork-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.s390x"
},
"product_reference": "apache2-prefork-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-prefork-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.i586"
},
"product_reference": "apache2-utils-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ia64"
},
"product_reference": "apache2-utils-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-utils-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.s390x"
},
"product_reference": "apache2-utils-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-utils-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.i586"
},
"product_reference": "apache2-worker-2.2.12-69.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ia64"
},
"product_reference": "apache2-worker-2.2.12-69.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ppc64"
},
"product_reference": "apache2-worker-2.2.12-69.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.s390x"
},
"product_reference": "apache2-worker-2.2.12-69.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.2.12-69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-worker-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.2.12-69.1.x86_64 as component of SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3:apache2-devel-2.2.12-69.1.x86_64"
},
"product_reference": "apache2-devel-2.2.12-69.1.x86_64",
"relates_to_product_reference": "SUSE Studio Onsite 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-2161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2161"
}
],
"notes": [
{
"category": "general",
"text": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Studio Onsite 1.3:apache2-devel-2.2.12-69.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2161",
"url": "https://www.suse.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "SUSE Bug 1016714 for CVE-2016-2161",
"url": "https://bugzilla.suse.com/1016714"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-2161",
"url": "https://bugzilla.suse.com/1033513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Studio Onsite 1.3:apache2-devel-2.2.12-69.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Studio Onsite 1.3:apache2-devel-2.2.12-69.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T13:58:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-2161"
},
{
"cve": "CVE-2016-8743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8743"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Studio Onsite 1.3:apache2-devel-2.2.12-69.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8743",
"url": "https://www.suse.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "SUSE Bug 1016715 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1033513"
},
{
"category": "external",
"summary": "SUSE Bug 1086774 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1086774"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "external",
"summary": "SUSE Bug 930944 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/930944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Studio Onsite 1.3:apache2-devel-2.2.12-69.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.12-69.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.12-69.1.x86_64",
"SUSE Studio Onsite 1.3:apache2-devel-2.2.12-69.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-17T13:58:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-8743"
}
]
}
SUSE-SU-2017:0801-1
Vulnerability from csaf_suse - Published: 2017-03-22 14:52 - Updated: 2017-03-22 14:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for apache2 provides the following fixes:\n\nSecurity issues fixed:\n- CVE-2016-0736: Protect mod_session_crypto data with a MAC to prevent padding oracle attacks (bsc#1016712).\n- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash, resulting in DoS (bsc#1016714).\n- CVE-2016-8743: Added new directive \u0027HttpProtocolOptions Strict\u0027 to avoid proxy chain misinterpretation (bsc#1016715).\n\nBugfixes:\n- Add NotifyAccess=all to systemd service files to prevent warnings in the log when using mod_systemd (bsc#980663).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SDK-12-SP1-2017-449,SUSE-SLE-SERVER-12-SP1-2017-449",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0801-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0801-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170801-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0801-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002741.html"
},
{
"category": "self",
"summary": "SUSE Bug 1016712",
"url": "https://bugzilla.suse.com/1016712"
},
{
"category": "self",
"summary": "SUSE Bug 1016714",
"url": "https://bugzilla.suse.com/1016714"
},
{
"category": "self",
"summary": "SUSE Bug 1016715",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "self",
"summary": "SUSE Bug 980663",
"url": "https://bugzilla.suse.com/980663"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0736 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2161 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8743 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8743/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2017-03-22T14:52:52Z",
"generator": {
"date": "2017-03-22T14:52:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0801-1",
"initial_release_date": "2017-03-22T14:52:52Z",
"revision_history": [
{
"date": "2017-03-22T14:52:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.16-19.1.noarch",
"product": {
"name": "apache2-doc-2.4.16-19.1.noarch",
"product_id": "apache2-doc-2.4.16-19.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.4.16-19.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.16-19.1.ppc64le",
"product_id": "apache2-devel-2.4.16-19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-2.4.16-19.1.ppc64le",
"product": {
"name": "apache2-2.4.16-19.1.ppc64le",
"product_id": "apache2-2.4.16-19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.16-19.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.16-19.1.ppc64le",
"product_id": "apache2-example-pages-2.4.16-19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.16-19.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.16-19.1.ppc64le",
"product_id": "apache2-prefork-2.4.16-19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.16-19.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.16-19.1.ppc64le",
"product_id": "apache2-utils-2.4.16-19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.16-19.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.16-19.1.ppc64le",
"product_id": "apache2-worker-2.4.16-19.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.4.16-19.1.s390x",
"product": {
"name": "apache2-devel-2.4.16-19.1.s390x",
"product_id": "apache2-devel-2.4.16-19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-2.4.16-19.1.s390x",
"product": {
"name": "apache2-2.4.16-19.1.s390x",
"product_id": "apache2-2.4.16-19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.16-19.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.16-19.1.s390x",
"product_id": "apache2-example-pages-2.4.16-19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.16-19.1.s390x",
"product": {
"name": "apache2-prefork-2.4.16-19.1.s390x",
"product_id": "apache2-prefork-2.4.16-19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.16-19.1.s390x",
"product": {
"name": "apache2-utils-2.4.16-19.1.s390x",
"product_id": "apache2-utils-2.4.16-19.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.16-19.1.s390x",
"product": {
"name": "apache2-worker-2.4.16-19.1.s390x",
"product_id": "apache2-worker-2.4.16-19.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.4.16-19.1.x86_64",
"product": {
"name": "apache2-devel-2.4.16-19.1.x86_64",
"product_id": "apache2-devel-2.4.16-19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-2.4.16-19.1.x86_64",
"product": {
"name": "apache2-2.4.16-19.1.x86_64",
"product_id": "apache2-2.4.16-19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.16-19.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.16-19.1.x86_64",
"product_id": "apache2-example-pages-2.4.16-19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.16-19.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.16-19.1.x86_64",
"product_id": "apache2-prefork-2.4.16-19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.16-19.1.x86_64",
"product": {
"name": "apache2-utils-2.4.16-19.1.x86_64",
"product_id": "apache2-utils-2.4.16-19.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.16-19.1.x86_64",
"product": {
"name": "apache2-worker-2.4.16-19.1.x86_64",
"product_id": "apache2-worker-2.4.16-19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x"
},
"product_reference": "apache2-devel-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-devel-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x"
},
"product_reference": "apache2-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.16-19.1.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch"
},
"product_reference": "apache2-doc-2.4.16-19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x"
},
"product_reference": "apache2-prefork-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x"
},
"product_reference": "apache2-utils-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-utils-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x"
},
"product_reference": "apache2-worker-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-worker-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x"
},
"product_reference": "apache2-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.16-19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch"
},
"product_reference": "apache2-doc-2.4.16-19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x"
},
"product_reference": "apache2-prefork-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x"
},
"product_reference": "apache2-utils-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-utils-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.16-19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x"
},
"product_reference": "apache2-worker-2.4.16-19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.16-19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64"
},
"product_reference": "apache2-worker-2.4.16-19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0736"
}
],
"notes": [
{
"category": "general",
"text": "In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0736",
"url": "https://www.suse.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "SUSE Bug 1016712 for CVE-2016-0736",
"url": "https://bugzilla.suse.com/1016712"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-0736",
"url": "https://bugzilla.suse.com/1033513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-22T14:52:52Z",
"details": "low"
}
],
"title": "CVE-2016-0736"
},
{
"cve": "CVE-2016-2161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2161"
}
],
"notes": [
{
"category": "general",
"text": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2161",
"url": "https://www.suse.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "SUSE Bug 1016714 for CVE-2016-2161",
"url": "https://bugzilla.suse.com/1016714"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-2161",
"url": "https://bugzilla.suse.com/1033513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-22T14:52:52Z",
"details": "moderate"
}
],
"title": "CVE-2016-2161"
},
{
"cve": "CVE-2016-8743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8743"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8743",
"url": "https://www.suse.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "SUSE Bug 1016715 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1033513"
},
{
"category": "external",
"summary": "SUSE Bug 1086774 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1086774"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "external",
"summary": "SUSE Bug 930944 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/930944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:apache2-devel-2.4.16-19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-22T14:52:52Z",
"details": "moderate"
}
],
"title": "CVE-2016-8743"
}
]
}
SUSE-SU-2017:0797-1
Vulnerability from csaf_suse - Published: 2017-03-22 14:54 - Updated: 2017-03-22 14:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for apache2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for apache2 fixes the following security issues:\n\nSecurity issues fixed:\n- CVE-2016-0736: Protect mod_session_crypto data with a MAC to prevent padding oracle attacks (bsc#1016712).\n- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash, resulting in DoS (bsc#1016714).\n- CVE-2016-8743: Added new directive \u0027HttpProtocolOptions Strict\u0027 to avoid proxy chain misinterpretation (bsc#1016715).\n\nBugfixes:\n- Add missing copy of hcuri and hcexpr from the worker to the health check worker (bsc#1019380).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-RPI-12-SP2-2017-450,SUSE-SLE-SDK-12-SP2-2017-450,SUSE-SLE-SERVER-12-SP2-2017-450",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0797-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0797-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170797-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0797-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002737.html"
},
{
"category": "self",
"summary": "SUSE Bug 1016712",
"url": "https://bugzilla.suse.com/1016712"
},
{
"category": "self",
"summary": "SUSE Bug 1016714",
"url": "https://bugzilla.suse.com/1016714"
},
{
"category": "self",
"summary": "SUSE Bug 1016715",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "self",
"summary": "SUSE Bug 1019380",
"url": "https://bugzilla.suse.com/1019380"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0736 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2161 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8743 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8743/"
}
],
"title": "Security update for apache2",
"tracking": {
"current_release_date": "2017-03-22T14:54:19Z",
"generator": {
"date": "2017-03-22T14:54:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0797-1",
"initial_release_date": "2017-03-22T14:54:19Z",
"revision_history": [
{
"date": "2017-03-22T14:54:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-21.1.aarch64",
"product": {
"name": "apache2-2.4.23-21.1.aarch64",
"product_id": "apache2-2.4.23-21.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-21.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.23-21.1.aarch64",
"product_id": "apache2-example-pages-2.4.23-21.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-21.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.23-21.1.aarch64",
"product_id": "apache2-prefork-2.4.23-21.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-21.1.aarch64",
"product": {
"name": "apache2-utils-2.4.23-21.1.aarch64",
"product_id": "apache2-utils-2.4.23-21.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-21.1.aarch64",
"product": {
"name": "apache2-worker-2.4.23-21.1.aarch64",
"product_id": "apache2-worker-2.4.23-21.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.23-21.1.aarch64",
"product": {
"name": "apache2-devel-2.4.23-21.1.aarch64",
"product_id": "apache2-devel-2.4.23-21.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-doc-2.4.23-21.1.noarch",
"product": {
"name": "apache2-doc-2.4.23-21.1.noarch",
"product_id": "apache2-doc-2.4.23-21.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.4.23-21.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.23-21.1.ppc64le",
"product_id": "apache2-devel-2.4.23-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-2.4.23-21.1.ppc64le",
"product": {
"name": "apache2-2.4.23-21.1.ppc64le",
"product_id": "apache2-2.4.23-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-21.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.23-21.1.ppc64le",
"product_id": "apache2-example-pages-2.4.23-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-21.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.23-21.1.ppc64le",
"product_id": "apache2-prefork-2.4.23-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-21.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.23-21.1.ppc64le",
"product_id": "apache2-utils-2.4.23-21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-21.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.23-21.1.ppc64le",
"product_id": "apache2-worker-2.4.23-21.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.4.23-21.1.s390x",
"product": {
"name": "apache2-devel-2.4.23-21.1.s390x",
"product_id": "apache2-devel-2.4.23-21.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-2.4.23-21.1.s390x",
"product": {
"name": "apache2-2.4.23-21.1.s390x",
"product_id": "apache2-2.4.23-21.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-21.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.23-21.1.s390x",
"product_id": "apache2-example-pages-2.4.23-21.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-21.1.s390x",
"product": {
"name": "apache2-prefork-2.4.23-21.1.s390x",
"product_id": "apache2-prefork-2.4.23-21.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-21.1.s390x",
"product": {
"name": "apache2-utils-2.4.23-21.1.s390x",
"product_id": "apache2-utils-2.4.23-21.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-21.1.s390x",
"product": {
"name": "apache2-worker-2.4.23-21.1.s390x",
"product_id": "apache2-worker-2.4.23-21.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-devel-2.4.23-21.1.x86_64",
"product": {
"name": "apache2-devel-2.4.23-21.1.x86_64",
"product_id": "apache2-devel-2.4.23-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-2.4.23-21.1.x86_64",
"product": {
"name": "apache2-2.4.23-21.1.x86_64",
"product_id": "apache2-2.4.23-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-21.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.23-21.1.x86_64",
"product_id": "apache2-example-pages-2.4.23-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-21.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.23-21.1.x86_64",
"product_id": "apache2-prefork-2.4.23-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-21.1.x86_64",
"product": {
"name": "apache2-utils-2.4.23-21.1.x86_64",
"product_id": "apache2-utils-2.4.23-21.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-21.1.x86_64",
"product": {
"name": "apache2-worker-2.4.23-21.1.x86_64",
"product_id": "apache2-worker-2.4.23-21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-21.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-utils-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-worker-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-devel-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x"
},
"product_reference": "apache2-devel-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-devel-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x"
},
"product_reference": "apache2-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-21.1.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x"
},
"product_reference": "apache2-prefork-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-utils-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x"
},
"product_reference": "apache2-utils-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-worker-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x"
},
"product_reference": "apache2-worker-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x"
},
"product_reference": "apache2-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch"
},
"product_reference": "apache2-doc-2.4.23-21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x"
},
"product_reference": "apache2-prefork-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-utils-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x"
},
"product_reference": "apache2-utils-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64"
},
"product_reference": "apache2-worker-2.4.23-21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.23-21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x"
},
"product_reference": "apache2-worker-2.4.23-21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0736"
}
],
"notes": [
{
"category": "general",
"text": "In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0736",
"url": "https://www.suse.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "SUSE Bug 1016712 for CVE-2016-0736",
"url": "https://bugzilla.suse.com/1016712"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-0736",
"url": "https://bugzilla.suse.com/1033513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-22T14:54:19Z",
"details": "low"
}
],
"title": "CVE-2016-0736"
},
{
"cve": "CVE-2016-2161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2161"
}
],
"notes": [
{
"category": "general",
"text": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2161",
"url": "https://www.suse.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "SUSE Bug 1016714 for CVE-2016-2161",
"url": "https://bugzilla.suse.com/1016714"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-2161",
"url": "https://bugzilla.suse.com/1033513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-22T14:54:19Z",
"details": "moderate"
}
],
"title": "CVE-2016-2161"
},
{
"cve": "CVE-2016-8743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8743"
}
],
"notes": [
{
"category": "general",
"text": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8743",
"url": "https://www.suse.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "SUSE Bug 1016715 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1016715"
},
{
"category": "external",
"summary": "SUSE Bug 1033513 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1033513"
},
{
"category": "external",
"summary": "SUSE Bug 1086774 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1086774"
},
{
"category": "external",
"summary": "SUSE Bug 1104826 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/1104826"
},
{
"category": "external",
"summary": "SUSE Bug 930944 for CVE-2016-8743",
"url": "https://bugzilla.suse.com/930944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-21.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-22T14:54:19Z",
"details": "moderate"
}
],
"title": "CVE-2016-8743"
}
]
}
GHSA-2RFH-2GH8-V9FQ
Vulnerability from github – Published: 2022-05-13 01:09 – Updated: 2025-04-20 03:41Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
{
"affected": [],
"aliases": [
"CVE-2016-8743"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-07-27T21:29:00Z",
"severity": "HIGH"
},
"details": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"id": "GHSA-2rfh-2gh8-v9fq",
"modified": "2025-04-20T03:41:35Z",
"published": "2022-05-13T01:09:42Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20180423-0001"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT208221"
},
{
"type": "WEB",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"type": "WEB",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us"
},
{
"type": "WEB",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"type": "WEB",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/95077"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1037508"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
RHSA-2017:1413
Vulnerability from csaf_redhat - Published: 2017-06-07 17:54 - Updated: 2025-11-21 18:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Core Services on RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash. (CVE-2016-8740)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1413",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
"url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
},
{
"category": "external",
"summary": "1377600",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600"
},
{
"category": "external",
"summary": "1384743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743"
},
{
"category": "external",
"summary": "1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "1412120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120"
},
{
"category": "external",
"summary": "JBCS-319",
"url": "https://issues.redhat.com/browse/JBCS-319"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1413.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7",
"tracking": {
"current_release_date": "2025-11-21T18:00:48+00:00",
"generator": {
"date": "2025-11-21T18:00:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1413",
"initial_release_date": "2017-06-07T17:54:35+00:00",
"revision_history": [
{
"date": "2017-06-07T17:54:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-06-07T17:54:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-19.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-120.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-120.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-120.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-120.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-120.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-120.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-120.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-120.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-120.jbcs.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-120.jbcs.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406744"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Padding Oracle in Apache mod_session_crypto",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "RHBZ#1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
},
{
"category": "external",
"summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt",
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Padding Oracle in Apache mod_session_crypto"
},
{
"cve": "CVE-2016-2161",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406753"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: DoS vulnerability in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "RHBZ#1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: DoS vulnerability in mod_auth_digest"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Shi Lei"
],
"organization": "Gear Team of Qihoo 360 Inc.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2016-6304",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2016-09-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1377600"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OCSP Status Request extension unbounded memory growth",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-6304"
},
{
"category": "external",
"summary": "RHBZ#1377600",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20160922.txt",
"url": "https://www.openssl.org/news/secadv/20160922.txt"
}
],
"release_date": "2016-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OCSP Status Request extension unbounded memory growth"
},
{
"cve": "CVE-2016-7056",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2017-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1412120"
}
],
"notes": [
{
"category": "description",
"text": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: ECDSA P-256 timing attack key recovery",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7056"
},
{
"category": "external",
"summary": "RHBZ#1412120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056"
}
],
"release_date": "2017-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: ECDSA P-256 timing attack key recovery"
},
{
"acknowledgments": [
{
"names": [
"Shi Lei"
],
"organization": "Gear Team of Qihoo 360 Inc."
}
],
"cve": "CVE-2016-8610",
"discovery_date": "2016-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8610"
},
{
"category": "external",
"summary": "RHBZ#1384743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8610"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610"
},
{
"category": "external",
"summary": "http://security.360.cn/cve/CVE-2016-8610",
"url": "http://security.360.cn/cve/CVE-2016-8610"
}
],
"release_date": "2016-10-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS"
},
{
"cve": "CVE-2016-8740",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2016-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1401528"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future\nupdates. For additional information, refer to the Issue Severity\nClassification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8740"
},
{
"category": "external",
"summary": "RHBZ#1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740"
},
{
"category": "external",
"summary": "http://seclists.org/bugtraq/2016/Dec/3",
"url": "http://seclists.org/bugtraq/2016/Dec/3"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2016-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"category": "workaround",
"details": "As a temporary workaround - HTTP/2 can be disabled by changing\nthe configuration by removing h2 and h2c from the Protocols\nline(s) in the configuration file. \n\nThe resulting line should read:\n\n\t\tProtocols http/1.1",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2"
},
{
"cve": "CVE-2016-8743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406822"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Request Parsing Whitespace Defects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "RHBZ#1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Request Parsing Whitespace Defects"
}
]
}
RHSA-2017:1415
Vulnerability from csaf_redhat - Published: 2017-06-07 17:43 - Updated: 2025-11-21 18:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Core Services.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash. (CVE-2016-8740)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1415",
"url": "https://access.redhat.com/errata/RHSA-2017:1415"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
"url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
},
{
"category": "external",
"summary": "1377600",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600"
},
{
"category": "external",
"summary": "1384743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743"
},
{
"category": "external",
"summary": "1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "1412120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1415.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1",
"tracking": {
"current_release_date": "2025-11-21T18:00:49+00:00",
"generator": {
"date": "2025-11-21T18:00:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1415",
"initial_release_date": "2017-06-07T17:43:43+00:00",
"revision_history": [
{
"date": "2017-06-07T17:43:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-06-07T17:43:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Text-Only JBCS",
"product": {
"name": "Text-Only JBCS",
"product_id": "Text-Only JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406744"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Padding Oracle in Apache mod_session_crypto",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "RHBZ#1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
},
{
"category": "external",
"summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt",
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:43:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1415"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Padding Oracle in Apache mod_session_crypto"
},
{
"cve": "CVE-2016-2161",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406753"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: DoS vulnerability in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "RHBZ#1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:43:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1415"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: DoS vulnerability in mod_auth_digest"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Shi Lei"
],
"organization": "Gear Team of Qihoo 360 Inc.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2016-6304",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2016-09-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1377600"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OCSP Status Request extension unbounded memory growth",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-6304"
},
{
"category": "external",
"summary": "RHBZ#1377600",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20160922.txt",
"url": "https://www.openssl.org/news/secadv/20160922.txt"
}
],
"release_date": "2016-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:43:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1415"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OCSP Status Request extension unbounded memory growth"
},
{
"cve": "CVE-2016-7056",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2017-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1412120"
}
],
"notes": [
{
"category": "description",
"text": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: ECDSA P-256 timing attack key recovery",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7056"
},
{
"category": "external",
"summary": "RHBZ#1412120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056"
}
],
"release_date": "2017-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:43:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1415"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: ECDSA P-256 timing attack key recovery"
},
{
"acknowledgments": [
{
"names": [
"Shi Lei"
],
"organization": "Gear Team of Qihoo 360 Inc."
}
],
"cve": "CVE-2016-8610",
"discovery_date": "2016-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8610"
},
{
"category": "external",
"summary": "RHBZ#1384743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8610"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610"
},
{
"category": "external",
"summary": "http://security.360.cn/cve/CVE-2016-8610",
"url": "http://security.360.cn/cve/CVE-2016-8610"
}
],
"release_date": "2016-10-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:43:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1415"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS"
},
{
"cve": "CVE-2016-8740",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2016-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1401528"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future\nupdates. For additional information, refer to the Issue Severity\nClassification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8740"
},
{
"category": "external",
"summary": "RHBZ#1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740"
},
{
"category": "external",
"summary": "http://seclists.org/bugtraq/2016/Dec/3",
"url": "http://seclists.org/bugtraq/2016/Dec/3"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2016-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:43:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1415"
},
{
"category": "workaround",
"details": "As a temporary workaround - HTTP/2 can be disabled by changing\nthe configuration by removing h2 and h2c from the Protocols\nline(s) in the configuration file. \n\nThe resulting line should read:\n\n\t\tProtocols http/1.1",
"product_ids": [
"Text-Only JBCS"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2"
},
{
"cve": "CVE-2016-8743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406822"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Request Parsing Whitespace Defects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Text-Only JBCS"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "RHBZ#1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:43:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Text-Only JBCS"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1415"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Text-Only JBCS"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Request Parsing Whitespace Defects"
}
]
}
RHSA-2017:1721
Vulnerability from csaf_redhat - Published: 2017-07-11 18:45 - Updated: 2025-11-21 18:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for httpd is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\nNote: The fix for the CVE-2016-8743 issue causes httpd to return \"400 Bad Request\" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive \"HttpProtocolOptions Unsafe\" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue.\n\nNote: Administrators of Red Hat Satellite 5 and Red Hat Satellite Proxy 5 systems should consult Red Hat Knowledgebase article 3013361 linked to in the Reference section before installing this update.\n\nBug Fix(es):\n\n* Previously, httpd was unable to correctly check a boundary of an array, and in rare cases it attempted to access an element of an array that was out of bounds. Consequently, httpd terminated unexpectedly with a segmentation fault at proxy_util.c. With this update, bounds checking has been fixed, and httpd no longer crashes. (BZ#1463354)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1721",
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3013361",
"url": "https://access.redhat.com/articles/3013361"
},
{
"category": "external",
"summary": "1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "1463354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463354"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1721.json"
}
],
"title": "Red Hat Security Advisory: httpd security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:01:18+00:00",
"generator": {
"date": "2025-11-21T18:01:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1721",
"initial_release_date": "2017-07-11T18:45:03+00:00",
"revision_history": [
{
"date": "2017-07-11T18:45:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-07-11T18:45:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:01:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"product": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"product_id": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"product": {
"name": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"product_id": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"product": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"product_id": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"product": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"product_id": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"product": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"product_id": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"product": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-60.el6_9.4.i686",
"product": {
"name": "httpd-0:2.2.15-60.el6_9.4.i686",
"product_id": "httpd-0:2.2.15-60.el6_9.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"product": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"product_id": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"product": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"product_id": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.4?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.15-60.el6_9.4.src",
"product": {
"name": "httpd-0:2.2.15-60.el6_9.4.src",
"product_id": "httpd-0:2.2.15-60.el6_9.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"product": {
"name": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"product_id": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.15-60.el6_9.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"product": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"product_id": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"product": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"product_id": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"product": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-60.el6_9.4.s390x",
"product": {
"name": "httpd-0:2.2.15-60.el6_9.4.s390x",
"product_id": "httpd-0:2.2.15-60.el6_9.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"product": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"product_id": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.4?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"product": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"product_id": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"product": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"product": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"product_id": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"product": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"product_id": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"product": {
"name": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"product_id": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"product": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"product_id": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.4?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"product": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"product_id": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"product": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.src"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-60.el6_9.4.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.src"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.src",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-60.el6_9.4.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.src"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-60.el6_9.4.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.src"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.src",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-60.el6_9.4.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.src"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-60.el6_9.4.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.src"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-60.el6_9.4.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-8743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406822"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Request Parsing Whitespace Defects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "RHBZ#1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-07-11T18:45:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Client-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Server-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.src",
"6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.4.noarch",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.4.x86_64",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.i686",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.ppc64",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.s390x",
"6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Request Parsing Whitespace Defects"
}
]
}
RHSA-2017:1414
Vulnerability from csaf_redhat - Published: 2017-06-07 17:54 - Updated: 2025-11-21 18:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Core Services on RHEL 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash. (CVE-2016-8740)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1414",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
"url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
},
{
"category": "external",
"summary": "1377600",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600"
},
{
"category": "external",
"summary": "1384743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743"
},
{
"category": "external",
"summary": "1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "1412120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120"
},
{
"category": "external",
"summary": "JBCS-318",
"url": "https://issues.redhat.com/browse/JBCS-318"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1414.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6",
"tracking": {
"current_release_date": "2025-11-21T18:00:49+00:00",
"generator": {
"date": "2025-11-21T18:00:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1414",
"initial_release_date": "2017-06-07T17:54:17+00:00",
"revision_history": [
{
"date": "2017-06-07T17:54:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-06-07T17:54:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-19.GA.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-120.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-120.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-120.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-120.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-120.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-120.jbcs.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-120.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-120.jbcs.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-120.jbcs.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-19.GA.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-120.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-120.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-120.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-120.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-120.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-120.jbcs.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-120.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-120.jbcs.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-120.jbcs.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-120.jbcs.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"relates_to_product_reference": "6Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
"product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64",
"relates_to_product_reference": "6Server-JBCS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406744"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Padding Oracle in Apache mod_session_crypto",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "RHBZ#1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
},
{
"category": "external",
"summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt",
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Padding Oracle in Apache mod_session_crypto"
},
{
"cve": "CVE-2016-2161",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406753"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: DoS vulnerability in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "RHBZ#1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: DoS vulnerability in mod_auth_digest"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Shi Lei"
],
"organization": "Gear Team of Qihoo 360 Inc.",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2016-6304",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2016-09-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1377600"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OCSP Status Request extension unbounded memory growth",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-6304"
},
{
"category": "external",
"summary": "RHBZ#1377600",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20160922.txt",
"url": "https://www.openssl.org/news/secadv/20160922.txt"
}
],
"release_date": "2016-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OCSP Status Request extension unbounded memory growth"
},
{
"cve": "CVE-2016-7056",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"discovery_date": "2017-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1412120"
}
],
"notes": [
{
"category": "description",
"text": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: ECDSA P-256 timing attack key recovery",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7056"
},
{
"category": "external",
"summary": "RHBZ#1412120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056"
}
],
"release_date": "2017-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: ECDSA P-256 timing attack key recovery"
},
{
"acknowledgments": [
{
"names": [
"Shi Lei"
],
"organization": "Gear Team of Qihoo 360 Inc."
}
],
"cve": "CVE-2016-8610",
"discovery_date": "2016-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8610"
},
{
"category": "external",
"summary": "RHBZ#1384743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8610"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610"
},
{
"category": "external",
"summary": "http://security.360.cn/cve/CVE-2016-8610",
"url": "http://security.360.cn/cve/CVE-2016-8610"
}
],
"release_date": "2016-10-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS"
},
{
"cve": "CVE-2016-8740",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2016-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1401528"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future\nupdates. For additional information, refer to the Issue Severity\nClassification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8740"
},
{
"category": "external",
"summary": "RHBZ#1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740"
},
{
"category": "external",
"summary": "http://seclists.org/bugtraq/2016/Dec/3",
"url": "http://seclists.org/bugtraq/2016/Dec/3"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2016-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"category": "workaround",
"details": "As a temporary workaround - HTTP/2 can be disabled by changing\nthe configuration by removing h2 and h2c from the Protocols\nline(s) in the configuration file. \n\nThe resulting line should read:\n\n\t\tProtocols http/1.1",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2"
},
{
"cve": "CVE-2016-8743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406822"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Request Parsing Whitespace Defects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "RHBZ#1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-07T17:54:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src",
"6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686",
"6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Request Parsing Whitespace Defects"
}
]
}
RHSA-2017:1161
Vulnerability from csaf_redhat - Published: 2017-04-26 10:19 - Updated: 2025-11-21 18:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd24 packages are now available as a part of Red Hat Software Collections 2.4 for Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module.\n\nThe httpd24 Software Collection has been upgraded to version 2.4.25, which provides a number of bug fixes and enhancements over the previous version. For detailed changes, see the Red Hat Software Collections 2.4 Release Notes linked from the References section. (BZ#1404778)\n\nSecurity Fix(es):\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* A denial of service flaw was found in httpd\u0027s mod_http2 module. A remote attacker could use this flaw to block server threads for long times, causing starvation of worker threads, by manipulating the flow control windows on streams. (CVE-2016-1546)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\nNote: The fix for the CVE-2016-8743 issue causes httpd to return \"400 Bad Request\" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive \"HttpProtocolOptions Unsafe\" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue.\n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash. (CVE-2016-8740)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1161",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Software_Collections/2/html/2.4_Release_Notes/chap-RHSCL.html#sect-RHSCL-Changes-httpd",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_Software_Collections/2/html/2.4_Release_Notes/chap-RHSCL.html#sect-RHSCL-Changes-httpd"
},
{
"category": "external",
"summary": "1329639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329639"
},
{
"category": "external",
"summary": "1335616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335616"
},
{
"category": "external",
"summary": "1336350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336350"
},
{
"category": "external",
"summary": "1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "1414037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414037"
},
{
"category": "external",
"summary": "1432249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432249"
},
{
"category": "external",
"summary": "1433474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433474"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1161.json"
}
],
"title": "Red Hat Security Advisory: httpd24-httpd security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:00:25+00:00",
"generator": {
"date": "2025-11-21T18:00:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1161",
"initial_release_date": "2017-04-26T10:19:21+00:00",
"revision_history": [
{
"date": "2017-04-26T10:19:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-04-26T10:19:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"product": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"product_id": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"product": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"product_id": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"product_id": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"product_id": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd24-httpd-0:2.4.25-9.el6.src",
"product": {
"name": "httpd24-httpd-0:2.4.25-9.el6.src",
"product_id": "httpd24-httpd-0:2.4.25-9.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-0:2.4.25-9.el7.src",
"product": {
"name": "httpd24-httpd-0:2.4.25-9.el7.src",
"product_id": "httpd24-httpd-0:2.4.25-9.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406744"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Padding Oracle in Apache mod_session_crypto",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "RHBZ#1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
},
{
"category": "external",
"summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt",
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Padding Oracle in Apache mod_session_crypto"
},
{
"cve": "CVE-2016-1546",
"discovery_date": "2016-05-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1336350"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in httpd\u0027s mod_http2 module. A remote attacker could use this flaw to block server threads for long times, causing starvation of worker threads, by manipulating the flow control windows on streams.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_http2 denial-of-service by thread starvation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1546"
},
{
"category": "external",
"summary": "RHBZ#1336350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1546",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1546"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2016-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_http2 denial-of-service by thread starvation"
},
{
"cve": "CVE-2016-2161",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406753"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: DoS vulnerability in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "RHBZ#1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: DoS vulnerability in mod_auth_digest"
},
{
"cve": "CVE-2016-8740",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2016-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1401528"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future\nupdates. For additional information, refer to the Issue Severity\nClassification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8740"
},
{
"category": "external",
"summary": "RHBZ#1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740"
},
{
"category": "external",
"summary": "http://seclists.org/bugtraq/2016/Dec/3",
"url": "http://seclists.org/bugtraq/2016/Dec/3"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2016-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"category": "workaround",
"details": "As a temporary workaround - HTTP/2 can be disabled by changing\nthe configuration by removing h2 and h2c from the Protocols\nline(s) in the configuration file. \n\nThe resulting line should read:\n\n\t\tProtocols http/1.1",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2"
},
{
"cve": "CVE-2016-8743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406822"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Request Parsing Whitespace Defects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "RHBZ#1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Request Parsing Whitespace Defects"
},
{
"acknowledgments": [
{
"names": [
"the Apache project"
]
}
],
"cve": "CVE-2020-11985",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2020-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1866559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the mod_remoteip module shipped with the httpd package. This flaw allows an attacker to spoof the IP address, resulting in the bypass of a mod_rewrite rule. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: IP address spoofing when proxying using mod_remoteip and mod_rewrite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects httpd-2.4.x, therefore, httpd packages shipped with Red Hat Enterprise Linux 6 are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-11985"
},
{
"category": "external",
"summary": "RHBZ#1866559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-11985",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11985"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11985",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11985"
}
],
"release_date": "2020-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: IP address spoofing when proxying using mod_remoteip and mod_rewrite"
}
]
}
RHSA-2017:0906
Vulnerability from csaf_redhat - Published: 2017-04-12 12:24 - Updated: 2025-11-21 18:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\nNote: The fix for the CVE-2016-8743 issue causes httpd to return \"400 Bad Request\" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive \"HttpProtocolOptions Unsafe\" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue.\n\nBug Fix(es):\n\n* When waking up child processes during a graceful restart, the httpd parent process could attempt to open more connections than necessary if a large number of child processes had been active prior to the restart. Consequently, a graceful restart could take a long time to complete. With this update, httpd has been fixed to limit the number of connections opened during a graceful restart to the number of active children, and the described problem no longer occurs. (BZ#1420002)\n\n* Previously, httpd running in a container returned the 500 HTTP status code (Internal Server Error) when a connection to a WebSocket server was closed. As a consequence, the httpd server failed to deliver the correct HTTP status and data to a client. With this update, httpd correctly handles all proxied requests to the WebSocket server, and the described problem no longer occurs. (BZ#1429947)\n\n* In a configuration using LDAP authentication with the mod_authnz_ldap module, the name set using the AuthLDAPBindDN directive was not correctly used to bind to the LDAP server for all queries. Consequently, authorization attempts failed. The LDAP modules have been fixed to ensure the configured name is correctly bound for LDAP queries, and authorization using LDAP no longer fails. (BZ#1420047)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:0906",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "1420002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420002"
},
{
"category": "external",
"summary": "1420047",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420047"
},
{
"category": "external",
"summary": "1429947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429947"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0906.json"
}
],
"title": "Red Hat Security Advisory: httpd security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:00:08+00:00",
"generator": {
"date": "2025-11-21T18:00:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:0906",
"initial_release_date": "2017-04-12T12:24:45+00:00",
"revision_history": [
{
"date": "2017-04-12T12:24:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-04-12T12:24:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"product": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"product_id": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.src",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.src",
"product_id": "httpd-0:2.4.6-45.el7_3.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x",
"product_id": "httpd-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406744"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Padding Oracle in Apache mod_session_crypto",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "RHBZ#1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
},
{
"category": "external",
"summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt",
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-12T12:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Padding Oracle in Apache mod_session_crypto"
},
{
"cve": "CVE-2016-2161",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406753"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: DoS vulnerability in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "RHBZ#1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-12T12:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: DoS vulnerability in mod_auth_digest"
},
{
"cve": "CVE-2016-4975",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2016-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1375968"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-4975"
},
{
"category": "external",
"summary": "RHBZ#1375968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375968"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975",
"url": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975"
}
],
"release_date": "2018-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-12T12:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir"
},
{
"cve": "CVE-2016-8743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406822"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Request Parsing Whitespace Defects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "RHBZ#1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-12T12:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Request Parsing Whitespace Defects"
}
]
}
JVNDB-2016-008607
Vulnerability from jvndb - Published: 2017-06-30 15:55 - Updated:2019-07-25 14:14| Type | URL | |
|---|---|---|
| Vendor | Product | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-008607.html",
"dc:date": "2019-07-25T14:14+09:00",
"dcterms:issued": "2017-06-30T15:55+09:00",
"dcterms:modified": "2019-07-25T14:14+09:00",
"description": "A vulnerability (CVE-2016-8743) exists in Cosminexus HTTP Server and Hitachi Web Server.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-008607.html",
"sec:cpe": [
{
"#text": "cpe:/a:apache:http_server",
"@product": "Apache HTTP Server",
"@vendor": "Apache Software Foundation",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_http_server",
"@product": "Cosminexus HTTP Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:hitachi_application_server",
"@product": "Hitachi Application Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:hitachi_application_server_for_developers",
"@product": "Hitachi Application Server for Developers",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:hitachi_web_server",
"@product": "Hitachi Web Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:it_operations_director",
"@product": "Hitachi IT Operations Director",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management",
"@product": "Job Management Partner 1/IT Desktop Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management-manager",
"@product": "Job Management Partner 1/IT Desktop Management - Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_integrated_management",
"@product": "Job Management Partner 1/Integrated Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:job_management_partner_1_performance_management_web_console",
"@product": "Job Management Partner 1/Performance Management - Web Console",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2fautomatic_operation",
"@product": "JP1/Automatic Operation",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2Fit_desktop_management-manager",
"@product": "JP1/IT Desktop Management - Manager",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1%2fperformance_management",
"@product": "JP1/Performance Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_automatic_job_management_system_3",
"@product": "JP1/Automatic Job Management System 3",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_integrated_management",
"@product": "JP1/Integrated Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_it_desktop_management",
"@product": "JP1/IT Desktop Management",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_operation_analytics",
"@product": "JP1/Operations Analytics",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:jp1_service_support",
"@product": "JP1/Service Support",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server",
"@product": "uCosminexus Application Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_enterprise",
"@product": "uCosminexus Application Server Enterprise",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_smart_edition",
"@product": "uCosminexus Application Server Smart Edition",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_standard",
"@product": "uCosminexus Application Server Standard",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer",
"@product": "uCosminexus Developer",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer_light",
"@product": "uCosminexus Developer Light",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer_standard",
"@product": "uCosminexus Developer Standard",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_primary_server",
"@product": "uCosminexus Primary Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_service_architect",
"@product": "uCosminexus Service Architect",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_service_platform",
"@product": "uCosminexus Service Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
{
"@score": "4.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-008607",
"sec:references": [
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743",
"@id": "CVE-2016-8743",
"@source": "CVE"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975",
"@id": "CVE-2016-4975",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"@id": "CVE-2016-8743",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975",
"@id": "CVE-2016-4975",
"@source": "NVD"
},
{
"#text": "https://cwe.mitre.org/data/definitions/19.html",
"@id": "CWE-19",
"@title": "Data Handling(CWE-19)"
}
],
"title": "Vulnerability in Cosminexus HTTP Server and Hitachi Web Server"
}
VAR-201707-0556
Vulnerability from variot - Updated: 2025-12-19 20:20Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. Cosminexus HTTP Server and Hitachi Web Server has a vulnerability (CVE-2016-8743) exists.May have unspecified impact. Successfully exploiting this issue may allow attackers to perform unauthorized actions. This may lead to other attacks. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
Security Fix(es):
-
A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-2161)
-
A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)
-
A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. (CVE-2016-8740)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304. JIRA issues fixed (https://issues.jboss.org/):
JBCS-319 - Errata for httpd 2.4.23 SP1 RHEL 7
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-10-31-2 macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, Security Update 2017-004 El Capitan
macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, Security Update 2017-004 El Capitan are now available and address the following:
802.1X Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An attacker may be able to exploit weaknesses in TLS 1.0 Description: A protocol security issue was addressed by enabling TLS 1.1 and TLS 1.2. CVE-2017-13832: an anonymous researcher
apache Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Multiple issues in Apache Description: Multiple issues were addressed by updating to version 2.4.27. CVE-2016-736 CVE-2016-2161 CVE-2016-5387 CVE-2016-8740 CVE-2016-8743 CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 CVE-2017-9788 CVE-2017-9789
APFS Available for: macOS High Sierra 10.13 Impact: A malicious Thunderbolt adapter may be able to recover unencrypted APFS filesystem data Description: An issue existed in the handling of DMA. This issue was addressed by limiting the time the FileVault decryption buffers are DMA mapped to the duration of the I/O operation. CVE-2017-13786: an anonymous researcher
APFS Available for: macOS High Sierra 10.13 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13800: Sergej Schumilo of Ruhr-University Bochum
AppleScript Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Decompiling an AppleScript with osadecompile may lead to arbitrary code execution Description: A validation issue was addressed with improved input sanitization. CVE-2017-13809: an anonymous researcher
ATS Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: A memory corruption issue was addressed with improved input validation. CVE-2017-13820: John Villamil, Doyensec
Audio Available for: macOS Sierra 10.12.6 Impact: Parsing a maliciously crafted QuickTime file may lead to an unexpected application termination or arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-13807: Yangkang (@dnpushme) of Qihoo 360 Qex Team
CFString Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13821: Australian Cyber Security Centre a Australian Signals Directorate
CoreText Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-13825: Australian Cyber Security Centre a Australian Signals Directorate
curl Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Uploading using TFTP to a maliciously crafted URL with libcurl may disclose application memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2017-1000100: Even Rouault, found by OSS-Fuzz
curl Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Processing a maliciously crafted URL with libcurl may cause unexpected application termination or read process memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2017-1000101: Brian Carpenter, Yongji Ouyang
Dictionary Widget Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Searching pasted text in the Dictionary widget may lead to compromise of user information Description: A validation issue existed which allowed local file access. This was addressed with input sanitization. CVE-2017-13801: xisigr of Tencent's Xuanwu Lab (tencent.com)
file Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Multiple issues in file Description: Multiple issues were addressed by updating to version 5.31. CVE-2017-13815
Fonts Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Rendering untrusted text may lead to spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-13828: an anonymous researcher
fsck_msdos Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13811: an anonymous researcher
Heimdal Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An attacker in a privileged network position may be able to impersonate a service Description: A validation issue existed in the handling of the KDC-REP service name. This issue was addressed through improved validation. CVE-2017-11103: Jeffrey Altman, Viktor Duchovni, and Nico Williams
HelpViewer Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: A quarantined HTML file may execute arbitrary JavaScript cross-origin Description: A cross-site scripting issue existed in HelpViewer. This issue was addressed by removing the affected file. CVE-2017-13819: an anonymous researcher
HFS Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13830: Sergej Schumilo of Ruhr-University Bochum
ImageIO Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-13814: Australian Cyber Security Centre a Australian Signals Directorate
ImageIO Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Processing a maliciously crafted image may lead to a denial of service Description: An information disclosure issue existed in the processing of disk images. This issue was addressed through improved memory management. CVE-2017-13831: an anonymous researcher
Kernel Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: A local user may be able to leak sensitive user information Description: A permissions issue existed in kernel packet counters. This issue was addressed through improved permission validation. CVE-2017-13810: an anonymous researcher
Kernel Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: A local user may be able to read kernel memory Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-2017-13817: Maxime Villard (m00nbsd)
Kernel Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13818: The UK's National Cyber Security Centre (NCSC) CVE-2017-13836: an anonymous researcher, an anonymous researcher CVE-2017-13841: an anonymous researcher CVE-2017-13840: an anonymous researcher CVE-2017-13842: an anonymous researcher CVE-2017-13782: Kevin Backhouse of Semmle Ltd.
Kernel Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13799: an anonymous researcher
Kernel Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13843: an anonymous researcher
Kernel Available for: macOS Sierra 10.12.6 Impact: Processing a malformed mach binary may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved validation. CVE-2017-13834: Maxime Villard (m00nbsd)
libarchive Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-13813: found by OSS-Fuzz CVE-2017-13816: found by OSS-Fuzz
libarchive Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: Multiple memory corruption issues existed in libarchive. These issues were addressed through improved input validation. CVE-2017-13812: found by OSS-Fuzz
libarchive Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2016-4736: Proteas of Qihoo 360 Nirvan Team
Open Scripting Architecture Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Decompiling an AppleScript with osadecompile may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13824: an anonymous researcher
PCRE Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Multiple issues in pcre Description: Multiple issues were addressed by updating to version 8.40. CVE-2017-13846
Postfix Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Multiple issues in Postfix Description: Multiple issues were addressed by updating to version 3.2.2. CVE-2017-13826: an anonymous researcher
Quick Look Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13822: Australian Cyber Security Centre a Australian Signals Directorate
Quick Look Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-7132: Australian Cyber Security Centre a Australian Signals Directorate
QuickTime Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13823: an anonymous researcher
Remote Management Available for: macOS Sierra 10.12.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13808: an anonymous researcher
Sandbox Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13838: an anonymous researcher
StreamingZip Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: A malicious zip file may be able modify restricted areas of the file system Description: A path handling issue was addressed with improved validation. CVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L.
tcpdump Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6 Impact: Multiple issues in tcpdump Description: Multiple issues were addressed by updating to version 4.9.2. CVE-2017-11108 CVE-2017-11541 CVE-2017-11542 CVE-2017-11543 CVE-2017-12893 CVE-2017-12894 CVE-2017-12895 CVE-2017-12896 CVE-2017-12897 CVE-2017-12898 CVE-2017-12899 CVE-2017-12900 CVE-2017-12901 CVE-2017-12902 CVE-2017-12985 CVE-2017-12986 CVE-2017-12987 CVE-2017-12988 CVE-2017-12989 CVE-2017-12990 CVE-2017-12991 CVE-2017-12992 CVE-2017-12993 CVE-2017-12994 CVE-2017-12995 CVE-2017-12996 CVE-2017-12997 CVE-2017-12998 CVE-2017-12999 CVE-2017-13000 CVE-2017-13001 CVE-2017-13002 CVE-2017-13003 CVE-2017-13004 CVE-2017-13005 CVE-2017-13006 CVE-2017-13007 CVE-2017-13008 CVE-2017-13009 CVE-2017-13010 CVE-2017-13011 CVE-2017-13012 CVE-2017-13013 CVE-2017-13014 CVE-2017-13015 CVE-2017-13016 CVE-2017-13017 CVE-2017-13018 CVE-2017-13019 CVE-2017-13020 CVE-2017-13021 CVE-2017-13022 CVE-2017-13023 CVE-2017-13024 CVE-2017-13025 CVE-2017-13026 CVE-2017-13027 CVE-2017-13028 CVE-2017-13029 CVE-2017-13030 CVE-2017-13031 CVE-2017-13032 CVE-2017-13033 CVE-2017-13034 CVE-2017-13035 CVE-2017-13036 CVE-2017-13037 CVE-2017-13038 CVE-2017-13039 CVE-2017-13040 CVE-2017-13041 CVE-2017-13042 CVE-2017-13043 CVE-2017-13044 CVE-2017-13045 CVE-2017-13046 CVE-2017-13047 CVE-2017-13048 CVE-2017-13049 CVE-2017-13050 CVE-2017-13051 CVE-2017-13052 CVE-2017-13053 CVE-2017-13054 CVE-2017-13055 CVE-2017-13687 CVE-2017-13688 CVE-2017-13689 CVE-2017-13690 CVE-2017-13725
Wi-Fi Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An attacker in Wi-Fi range may force nonce reuse in WPA clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU Leuven CVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU Leuven CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven
Installation note:
macOS High Sierra 10.13.1 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAln4u74pHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEZL1A// WjcVy4745VcW+I0+qKZta734BUyZNPmQ+Jq5t5wt5tJN87UjQGfxNOtw8/BMC2hy bd9FOtfIPzPvEyjiVJCE2LZPNAIh/DUWzo8XozKHgbjjN4vxodnVwLXQ3rMMXqBI yiQseOurBofRKXyQwi+6nx6DhzvX63d0dsdXHfnpEKYDjPLRWDQOk92d6SxJqtYM tpYWiDJkssYEIS/oTlffOfwSvo2P5qffSEgsKjS4MvXLmG98IEAacEGmszpddeDZ 8SALW7QFrlYQNXi8YY0U9jc9em2aiaLKs0icuCKSxrcnvkB1T/8b23tG/SmnZ6vu yaFKFdMShtnmtMOr2FRg6tvQOn0traIbUMbh+7MDpr7IZIq2Nj5PanqMvQZ3R/tQ wfIN7buS/HACZycceaJu7y5GNjL3u2y3fsNLcMzUADkf5Z1LwcihPuh3563uzlho HcGolNk19S0Q/+ixWYDvJoLEaQmA7PPOdsCIlj8IGJgw42P78iuE+NBhQuttn/35 siLGxUUpWyXlFWoZvbLVM1jk7SUnrCSQWyRTvnh80Gdq+zym5N986uP7+9/GUIZ/ 4e4I5edR85eC1Nfhqbceg4U0wc2/Ox+l9Cah+awIbemt1MtigjT9Hkwd+xUMwTN6 /49TlNfE12+rdM9LB5L7+zgUPbhsQzH/l23fK6mIPAs= =pFCC -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: httpd24-httpd security, bug fix, and enhancement update Advisory ID: RHSA-2017:1161-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2017:1161 Issue date: 2017-04-26 CVE Names: CVE-2016-0736 CVE-2016-1546 CVE-2016-2161 CVE-2016-8740 CVE-2016-8743 =====================================================================
- Summary:
Updated httpd24 packages are now available as a part of Red Hat Software Collections 2.4 for Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
The httpd24 Software Collection has been upgraded to version 2.4.25, which provides a number of bug fixes and enhancements over the previous version. For detailed changes, see the Red Hat Software Collections 2.4 Release Notes linked from the References section. (BZ#1404778)
Security Fix(es):
-
It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)
-
A denial of service flaw was found in httpd's mod_http2 module. A remote attacker could use this flaw to block server threads for long times, causing starvation of worker threads, by manipulating the flow control windows on streams. (CVE-2016-1546)
-
It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)
-
It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)
Note: The fix for the CVE-2016-8743 issue causes httpd to return "400 Bad Request" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive "HttpProtocolOptions Unsafe" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue.
-
A vulnerability was found in httpd's handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server's available memory, causing httpd to crash. (CVE-2016-8740)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
1329639 - error in service httpd24-httpd configtest 1335616 - Backport Apache PR58118 to fix mod_proxy_fcgi spamming non-errors: AH01075: Error dispatching request to : (passing brigade to output filters) 1336350 - CVE-2016-1546 httpd: mod_http2 denial-of-service by thread starvation 1401528 - CVE-2016-8740 httpd: Incomplete handling of LimitRequestFields directive in mod_http2 1406744 - CVE-2016-0736 httpd: Padding Oracle in Apache mod_session_crypto 1406753 - CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest 1406822 - CVE-2016-8743 httpd: Apache HTTP Request Parsing Whitespace Defects 1414037 - mod_proxy_fcgi regression in 2.4.23+ 1432249 - must fail startup with conflicting Listen directives 1433474 - wrong requires of httpd24-httpd and httpd24-httpd-tools
- Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source: httpd24-httpd-2.4.25-9.el6.src.rpm
noarch: httpd24-httpd-manual-2.4.25-9.el6.noarch.rpm
x86_64: httpd24-httpd-2.4.25-9.el6.x86_64.rpm httpd24-httpd-debuginfo-2.4.25-9.el6.x86_64.rpm httpd24-httpd-devel-2.4.25-9.el6.x86_64.rpm httpd24-httpd-tools-2.4.25-9.el6.x86_64.rpm httpd24-mod_ldap-2.4.25-9.el6.x86_64.rpm httpd24-mod_proxy_html-2.4.25-9.el6.x86_64.rpm httpd24-mod_session-2.4.25-9.el6.x86_64.rpm httpd24-mod_ssl-2.4.25-9.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):
Source: httpd24-httpd-2.4.25-9.el6.src.rpm
noarch: httpd24-httpd-manual-2.4.25-9.el6.noarch.rpm
x86_64: httpd24-httpd-2.4.25-9.el6.x86_64.rpm httpd24-httpd-debuginfo-2.4.25-9.el6.x86_64.rpm httpd24-httpd-devel-2.4.25-9.el6.x86_64.rpm httpd24-httpd-tools-2.4.25-9.el6.x86_64.rpm httpd24-mod_ldap-2.4.25-9.el6.x86_64.rpm httpd24-mod_proxy_html-2.4.25-9.el6.x86_64.rpm httpd24-mod_session-2.4.25-9.el6.x86_64.rpm httpd24-mod_ssl-2.4.25-9.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source: httpd24-httpd-2.4.25-9.el6.src.rpm
noarch: httpd24-httpd-manual-2.4.25-9.el6.noarch.rpm
x86_64: httpd24-httpd-2.4.25-9.el6.x86_64.rpm httpd24-httpd-debuginfo-2.4.25-9.el6.x86_64.rpm httpd24-httpd-devel-2.4.25-9.el6.x86_64.rpm httpd24-httpd-tools-2.4.25-9.el6.x86_64.rpm httpd24-mod_ldap-2.4.25-9.el6.x86_64.rpm httpd24-mod_proxy_html-2.4.25-9.el6.x86_64.rpm httpd24-mod_session-2.4.25-9.el6.x86_64.rpm httpd24-mod_ssl-2.4.25-9.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source: httpd24-httpd-2.4.25-9.el7.src.rpm
noarch: httpd24-httpd-manual-2.4.25-9.el7.noarch.rpm
x86_64: httpd24-httpd-2.4.25-9.el7.x86_64.rpm httpd24-httpd-debuginfo-2.4.25-9.el7.x86_64.rpm httpd24-httpd-devel-2.4.25-9.el7.x86_64.rpm httpd24-httpd-tools-2.4.25-9.el7.x86_64.rpm httpd24-mod_ldap-2.4.25-9.el7.x86_64.rpm httpd24-mod_proxy_html-2.4.25-9.el7.x86_64.rpm httpd24-mod_session-2.4.25-9.el7.x86_64.rpm httpd24-mod_ssl-2.4.25-9.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3):
Source: httpd24-httpd-2.4.25-9.el7.src.rpm
noarch: httpd24-httpd-manual-2.4.25-9.el7.noarch.rpm
x86_64: httpd24-httpd-2.4.25-9.el7.x86_64.rpm httpd24-httpd-debuginfo-2.4.25-9.el7.x86_64.rpm httpd24-httpd-devel-2.4.25-9.el7.x86_64.rpm httpd24-httpd-tools-2.4.25-9.el7.x86_64.rpm httpd24-mod_ldap-2.4.25-9.el7.x86_64.rpm httpd24-mod_proxy_html-2.4.25-9.el7.x86_64.rpm httpd24-mod_session-2.4.25-9.el7.x86_64.rpm httpd24-mod_ssl-2.4.25-9.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source: httpd24-httpd-2.4.25-9.el7.src.rpm
noarch: httpd24-httpd-manual-2.4.25-9.el7.noarch.rpm
x86_64: httpd24-httpd-2.4.25-9.el7.x86_64.rpm httpd24-httpd-debuginfo-2.4.25-9.el7.x86_64.rpm httpd24-httpd-devel-2.4.25-9.el7.x86_64.rpm httpd24-httpd-tools-2.4.25-9.el7.x86_64.rpm httpd24-mod_ldap-2.4.25-9.el7.x86_64.rpm httpd24-mod_proxy_html-2.4.25-9.el7.x86_64.rpm httpd24-mod_session-2.4.25-9.el7.x86_64.rpm httpd24-mod_ssl-2.4.25-9.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-0736 https://access.redhat.com/security/cve/CVE-2016-1546 https://access.redhat.com/security/cve/CVE-2016-2161 https://access.redhat.com/security/cve/CVE-2016-8740 https://access.redhat.com/security/cve/CVE-2016-8743 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Software_Collections/2/html/2.4_Release_Notes/chap-RHSCL.html#sect-RHSCL-Changes-httpd
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFZAJq1XlSAg2UNWIIRAlGKAJ9zNHkvJQ9/I+imHbgRwjelvV9xKgCeLyYO SjFZr+hN7gjeQOgcC0kswCY= =m+ZH -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03725en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbux03725en_us Version: 1
HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2017-03-29 Last Updated: 2017-03-29
Potential Security Impact: Remote: Denial of Service (DoS), Unauthorized Read Access to Data
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Web Server Suite running Apache on HP-UX 11iv3.
- HP-UX Apache-based Web Server B.11.31 - httpd prior to B.2.4.18.02
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2016-0736
0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)
CVE-2016-2161
0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)
CVE-2016-2183
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-2016-8740
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-8743
0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided the following software updates to resolve the vulnerabilities with HP-UX Web Server Suite running Apache.
Apache 2.4.18.02 for HP-UX Release B.11.31 (PA and IA):
- 32 bit Depot: HP-UX 11.31(HPUXWS24ATW-B503-11-31-64.depot)
- 64 bit Depot: HP-UX 11.31(HPUXWS24ATW-B503-11-31-32.depot)
Note: The depot files can be found here: https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb r=HPUXWSATW503
MANUAL ACTIONS: Yes - Update Download and install the software update
PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HPE and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb r=B6834AA
AFFECTED VERSIONS
HP-UX B.11.31 IA/PA
===================
hpuxws24APACHE.APACHE
hpuxws24APACHE.APACHE2
hpuxws24APACHE.AUTH_LDAP
hpuxws24APACHE.AUTH_LDAP2
hpuxws24APACHE.MOD_JK
hpuxws24APACHE.MOD_JK2
hpuxws24APACHE.MOD_PERL
hpuxws24APACHE.MOD_PERL2
hpuxws24APACHE.WEBPROXY
hpuxws24APACHE.WEBPROXY2
action: install B.2.4.18.02 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 29 March 2017 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ========================================================================== Ubuntu Security Notice USN-3279-1 May 09, 2017
apache2 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Apache HTTP Server.
Software Description: - apache2: Apache HTTP server
Details:
It was discovered that the Apache mod_session_crypto module was encrypting data and cookies using either CBC or ECB modes. (CVE-2016-0736)
Maksim Malyutin discovered that the Apache mod_auth_digest module incorrectly handled malicious input. A new configuration option "HttpProtocolOptions Unsafe" can be used to revert to the previous unsafe behaviour in problematic environments. (CVE-2016-8743)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10: apache2-bin 2.4.18-2ubuntu4.1
Ubuntu 16.04 LTS: apache2-bin 2.4.18-2ubuntu3.2
Ubuntu 14.04 LTS: apache2-bin 2.4.7-1ubuntu4.14
In general, a standard system update will make all the necessary changes
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201707-0556",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "9.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "http server",
"scope": "lte",
"trust": 1.0,
"vendor": "apache",
"version": "2.2.31"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "http server",
"scope": "gte",
"trust": 1.0,
"vendor": "apache",
"version": "2.2.0"
},
{
"model": "http server",
"scope": "lte",
"trust": 1.0,
"vendor": "apache",
"version": "2.4.23"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "8.0"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "http server",
"scope": "gte",
"trust": 1.0,
"vendor": "apache",
"version": "2.4.1"
},
{
"model": "clustered data ontap",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "jboss core services",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "1.0"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.5"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "oncommand unified manager",
"scope": "eq",
"trust": 1.0,
"vendor": "netapp",
"version": null
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "webotx",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u672c\u96fb\u6c17",
"version": null
},
{
"model": "hitachi it operations director",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "jp1/integrated management",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus developer",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "jp1/service support",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "istorage",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u672c\u96fb\u6c17",
"version": null
},
{
"model": "ucosminexus service architect",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "hitachi application server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "jp1/operations analytics",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "jp1/it desktop management - manager",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "jp1/it desktop management",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus primary server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "simpwright",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u672c\u96fb\u6c17",
"version": null
},
{
"model": "spoolserver\u30b7\u30ea\u30fc\u30ba",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u672c\u96fb\u6c17",
"version": null
},
{
"model": "ucosminexus developer light",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "job management partner 1/it desktop management",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "cosminexus http server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "mailshooter",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u672c\u96fb\u6c17",
"version": null
},
{
"model": "ucosminexus developer standard",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus application server standard",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus application server enterprise",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "csview",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u672c\u96fb\u6c17",
"version": null
},
{
"model": "job management partner 1/performance management - web console",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "jp1/automatic job management system 3",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "hitachi application server for developers",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus service platform",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "http server",
"scope": null,
"trust": 0.8,
"vendor": "apache",
"version": null
},
{
"model": "job management partner 1/it desktop management - manager",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus application server smart edition",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "job management partner 1/integrated management",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus application server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "jp1/automatic operation",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "jp1/performance management",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "hitachi web server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.9"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.16"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.6"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.17"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.10"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.12"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.7"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.18"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.20"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.4.23"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.3.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.10.186"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.4.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.20"
},
{
"model": "enterprise linux computenode optional",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.15-210"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.2.6"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.32"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.29"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "7"
},
{
"model": "apache",
"scope": "ne",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.25"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.10"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.6"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.14"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.2.9.1"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.5"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.5.146"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.16"
},
{
"model": "jboss core services on rhel server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "60"
},
{
"model": "enterprise linux server optional",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.3"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.5"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.12"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.2"
},
{
"model": "security update el capitan",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "2017-0010"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.9"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.5"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.11"
},
{
"model": "enterprise linux client optional",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.16"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.15"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.5"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.3"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.7"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.2.127"
},
{
"model": "macos",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "10.12.4"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0.2.106"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.0"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.12"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.8.179"
},
{
"model": "enterprise linux workstation optional",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.8"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.2"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.17"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.0"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.14.20"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.5.5"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.6"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.2.77"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.21"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.1"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.4"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.20"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.5.4"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.1-73"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.16"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.22"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.2.27"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.13"
},
{
"model": "jboss core services on rhel server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "70"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.8"
},
{
"model": "centos",
"scope": "eq",
"trust": 0.3,
"vendor": "centos",
"version": "7"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.11"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "7"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.24"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.12"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.6.156"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.15"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.2"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.10"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.4"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.23"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.18"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.3"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.9"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.23"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.19"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.14"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.10"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.6"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.14"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.24"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.17"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.4"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.5"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.0.121"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.1.2"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.7"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.26"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.18"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.7"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.8"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.4.143"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.15210"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.64"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.4"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.11"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.3"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.13"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.19"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.2.8"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.3"
},
{
"model": "macos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.12.3"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.1.1"
},
{
"model": "security update yosemite",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "2017-0010"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.3.132"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.13"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0.1"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.8"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.25"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.3.0"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.15"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.6"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.2.0-12"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.3.10"
},
{
"model": "system management homepage",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "7.6.1"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.9"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0.1.104"
},
{
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.4.6"
}
],
"sources": [
{
"db": "BID",
"id": "95077"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"db": "NVD",
"id": "CVE-2016-8743"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "David Dennerline at IBM Security\u0027s X-Force Researchers as well as Regis Leroy",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
}
],
"trust": 0.6
},
"cve": "CVE-2016-8743",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-8743",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "VENDOR",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2016-008607",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2016-8743",
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
{
"attackComplexity": "High",
"attackVector": "Network",
"author": "VENDOR",
"availabilityImpact": "None",
"baseScore": 4.0,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2016-008607",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-8743",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "VENDOR",
"id": "JVNDB-2016-008607",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-648",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2016-8743",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2016-8743"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"db": "NVD",
"id": "CVE-2016-8743"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. Cosminexus HTTP Server and Hitachi Web Server has a vulnerability (CVE-2016-8743) exists.May have unspecified impact. \nSuccessfully exploiting this issue may allow attackers to perform unauthorized actions. This may lead to other attacks. This software, such as Apache HTTP Server, is\ncommon to multiple JBoss middleware products, and is packaged under Red Hat\nJBoss Core Services to allow for faster distribution of updates, and for a\nmore consistent update experience. \n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status\nrequest extension data during session renegotiation. A remote attacker\ncould cause a TLS server using OpenSSL to consume an excessive amount of\nmemory and, possibly, exit unexpectedly after exhausting all available\nmemory, if it enabled OCSP stapling support. (CVE-2016-2161)\n\n* A timing attack flaw was found in OpenSSL that could allow a malicious\nuser with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol\ndefined processing of ALERT packets during a connection handshake. (CVE-2016-8740)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304\nand Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. \nUpstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original\nreporter of CVE-2016-6304. JIRA issues fixed (https://issues.jboss.org/):\n\nJBCS-319 - Errata for httpd 2.4.23 SP1 RHEL 7\n\n7. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-10-31-2 macOS High Sierra 10.13.1,\nSecurity Update 2017-001 Sierra, Security Update 2017-004 El Capitan\n\nmacOS High Sierra 10.13.1, Security Update 2017-001 Sierra, Security\nUpdate 2017-004 El Capitan are now available and address the\nfollowing:\n\n802.1X\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An attacker may be able to exploit weaknesses in TLS 1.0\nDescription: A protocol security issue was addressed by enabling TLS\n1.1 and TLS 1.2. \nCVE-2017-13832: an anonymous researcher\n\napache\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Multiple issues in Apache\nDescription: Multiple issues were addressed by updating to version\n2.4.27. \nCVE-2016-736\nCVE-2016-2161\nCVE-2016-5387\nCVE-2016-8740\nCVE-2016-8743\nCVE-2017-3167\nCVE-2017-3169\nCVE-2017-7659\nCVE-2017-7668\nCVE-2017-7679\nCVE-2017-9788\nCVE-2017-9789\n\nAPFS\nAvailable for: macOS High Sierra 10.13\nImpact: A malicious Thunderbolt adapter may be able to recover\nunencrypted APFS filesystem data\nDescription: An issue existed in the handling of DMA. This issue was\naddressed by limiting the time the FileVault decryption buffers are\nDMA mapped to the duration of the I/O operation. \nCVE-2017-13786: an anonymous researcher\n\nAPFS\nAvailable for: macOS High Sierra 10.13\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13800: Sergej Schumilo of Ruhr-University Bochum\n\nAppleScript\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Decompiling an AppleScript with osadecompile may lead to\narbitrary code execution\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13809: an anonymous researcher\n\nATS\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Processing a maliciously crafted font may result in the\ndisclosure of process memory\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2017-13820: John Villamil, Doyensec\n\nAudio\nAvailable for: macOS Sierra 10.12.6\nImpact: Parsing a maliciously crafted QuickTime file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-13807: Yangkang (@dnpushme) of Qihoo 360 Qex Team\n\nCFString\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13821: Australian Cyber Security Centre a Australian Signals\nDirectorate\n\nCoreText\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-13825: Australian Cyber Security Centre a Australian Signals\nDirectorate\n\ncurl\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El\nCapitan 10.11.6\nImpact: Uploading using TFTP to a maliciously crafted URL with\nlibcurl may disclose application memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2017-1000100: Even Rouault, found by OSS-Fuzz\n\ncurl\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El\nCapitan 10.11.6\nImpact: Processing a maliciously crafted URL with libcurl may cause\nunexpected application termination or read process memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2017-1000101: Brian Carpenter, Yongji Ouyang\n\nDictionary Widget\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El\nCapitan 10.11.6\nImpact: Searching pasted text in the Dictionary widget may lead to\ncompromise of user information\nDescription: A validation issue existed which allowed local file\naccess. This was addressed with input sanitization. \nCVE-2017-13801: xisigr of Tencent\u0027s Xuanwu Lab (tencent.com)\n\nfile\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Multiple issues in file\nDescription: Multiple issues were addressed by updating to version\n5.31. \nCVE-2017-13815\n\nFonts\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Rendering untrusted text may lead to spoofing\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2017-13828: an anonymous researcher\n\nfsck_msdos\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13811: an anonymous researcher\n\nHeimdal\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An attacker in a privileged network position may be able\nto impersonate a service\nDescription: A validation issue existed in the handling of\nthe KDC-REP service name. This issue was addressed through improved\nvalidation. \nCVE-2017-11103: Jeffrey Altman, Viktor Duchovni, and Nico Williams\n\nHelpViewer\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: A quarantined HTML file may execute arbitrary JavaScript\ncross-origin\nDescription: A cross-site scripting issue existed in HelpViewer. This\nissue was addressed by removing the affected file. \nCVE-2017-13819: an anonymous researcher\n\nHFS\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13830: Sergej Schumilo of Ruhr-University Bochum\n\nImageIO\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-13814: Australian Cyber Security Centre a Australian Signals\nDirectorate\n\nImageIO\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Processing a maliciously crafted image may lead to a denial\nof service\nDescription: An information disclosure issue existed in the\nprocessing of disk images. This issue was addressed through improved\nmemory management. \nCVE-2017-13831: an anonymous researcher\n\nKernel\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: A local user may be able to leak sensitive user information\nDescription: A permissions issue existed in kernel packet counters. \nThis issue was addressed through improved permission validation. \nCVE-2017-13810: an anonymous researcher\n\nKernel\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: A local user may be able to read kernel memory\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-2017-13817: Maxime Villard (m00nbsd)\n\nKernel\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13818: The UK\u0027s National Cyber Security Centre (NCSC)\nCVE-2017-13836: an anonymous researcher, an anonymous researcher\nCVE-2017-13841: an anonymous researcher\nCVE-2017-13840: an anonymous researcher\nCVE-2017-13842: an anonymous researcher\nCVE-2017-13782: Kevin Backhouse of Semmle Ltd. \n\nKernel\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13799: an anonymous researcher\n\nKernel\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13843: an anonymous researcher\n\nKernel\nAvailable for: macOS Sierra 10.12.6\nImpact: Processing a malformed mach binary may lead to arbitrary code\nexecution\nDescription: A memory corruption issue was addressed through improved\nvalidation. \nCVE-2017-13834: Maxime Villard (m00nbsd)\n\nlibarchive\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Unpacking a maliciously crafted archive may lead to arbitrary\ncode execution\nDescription: A buffer overflow issue was addressed through improved\nmemory handling. \nCVE-2017-13813: found by OSS-Fuzz\nCVE-2017-13816: found by OSS-Fuzz\n\nlibarchive\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Unpacking a maliciously crafted archive may lead to arbitrary\ncode execution\nDescription: Multiple memory corruption issues existed in libarchive. \nThese issues were addressed through improved input validation. \nCVE-2017-13812: found by OSS-Fuzz\n\nlibarchive\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2016-4736: Proteas of Qihoo 360 Nirvan Team\n\nOpen Scripting Architecture\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Decompiling an AppleScript with osadecompile may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13824: an anonymous researcher\n\nPCRE\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Multiple issues in pcre\nDescription: Multiple issues were addressed by updating to version\n8.40. \nCVE-2017-13846\n\nPostfix\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Multiple issues in Postfix\nDescription: Multiple issues were addressed by updating to version\n3.2.2. \nCVE-2017-13826: an anonymous researcher\n\nQuick Look\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13822: Australian Cyber Security Centre a Australian Signals\nDirectorate\n\nQuick Look\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: Parsing a maliciously crafted office document may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-7132: Australian Cyber Security Centre a Australian Signals\nDirectorate\n\nQuickTime\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13823: an anonymous researcher\n\nRemote Management\nAvailable for: macOS Sierra 10.12.6\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13808: an anonymous researcher\n\nSandbox\nAvailable for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13838: an anonymous researcher\n\nStreamingZip\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El\nCapitan 10.11.6\nImpact: A malicious zip file may be able modify restricted areas of\nthe file system\nDescription: A path handling issue was addressed with improved\nvalidation. \nCVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L. \n\ntcpdump\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6\nImpact: Multiple issues in tcpdump\nDescription: Multiple issues were addressed by updating to version\n4.9.2. \nCVE-2017-11108\nCVE-2017-11541\nCVE-2017-11542\nCVE-2017-11543\nCVE-2017-12893\nCVE-2017-12894\nCVE-2017-12895\nCVE-2017-12896\nCVE-2017-12897\nCVE-2017-12898\nCVE-2017-12899\nCVE-2017-12900\nCVE-2017-12901\nCVE-2017-12902\nCVE-2017-12985\nCVE-2017-12986\nCVE-2017-12987\nCVE-2017-12988\nCVE-2017-12989\nCVE-2017-12990\nCVE-2017-12991\nCVE-2017-12992\nCVE-2017-12993\nCVE-2017-12994\nCVE-2017-12995\nCVE-2017-12996\nCVE-2017-12997\nCVE-2017-12998\nCVE-2017-12999\nCVE-2017-13000\nCVE-2017-13001\nCVE-2017-13002\nCVE-2017-13003\nCVE-2017-13004\nCVE-2017-13005\nCVE-2017-13006\nCVE-2017-13007\nCVE-2017-13008\nCVE-2017-13009\nCVE-2017-13010\nCVE-2017-13011\nCVE-2017-13012\nCVE-2017-13013\nCVE-2017-13014\nCVE-2017-13015\nCVE-2017-13016\nCVE-2017-13017\nCVE-2017-13018\nCVE-2017-13019\nCVE-2017-13020\nCVE-2017-13021\nCVE-2017-13022\nCVE-2017-13023\nCVE-2017-13024\nCVE-2017-13025\nCVE-2017-13026\nCVE-2017-13027\nCVE-2017-13028\nCVE-2017-13029\nCVE-2017-13030\nCVE-2017-13031\nCVE-2017-13032\nCVE-2017-13033\nCVE-2017-13034\nCVE-2017-13035\nCVE-2017-13036\nCVE-2017-13037\nCVE-2017-13038\nCVE-2017-13039\nCVE-2017-13040\nCVE-2017-13041\nCVE-2017-13042\nCVE-2017-13043\nCVE-2017-13044\nCVE-2017-13045\nCVE-2017-13046\nCVE-2017-13047\nCVE-2017-13048\nCVE-2017-13049\nCVE-2017-13050\nCVE-2017-13051\nCVE-2017-13052\nCVE-2017-13053\nCVE-2017-13054\nCVE-2017-13055\nCVE-2017-13687\nCVE-2017-13688\nCVE-2017-13689\nCVE-2017-13690\nCVE-2017-13725\n\nWi-Fi\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El\nCapitan 10.11.6\nImpact: An attacker in Wi-Fi range may force nonce reuse in WPA\nclients (Key Reinstallation Attacks - KRACK)\nDescription: A logic issue existed in the handling of state\ntransitions. This was addressed with improved state management. \nCVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\nCVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\nCVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU\nLeuven\n\nInstallation note:\n\nmacOS High Sierra 10.13.1 may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\n/49TlNfE12+rdM9LB5L7+zgUPbhsQzH/l23fK6mIPAs=\n=pFCC\n-----END PGP SIGNATURE-----\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: httpd24-httpd security, bug fix, and enhancement update\nAdvisory ID: RHSA-2017:1161-01\nProduct: Red Hat Software Collections\nAdvisory URL: https://access.redhat.com/errata/RHSA-2017:1161\nIssue date: 2017-04-26\nCVE Names: CVE-2016-0736 CVE-2016-1546 CVE-2016-2161 \n CVE-2016-8740 CVE-2016-8743 \n=====================================================================\n\n1. Summary:\n\nUpdated httpd24 packages are now available as a part of Red Hat Software\nCollections 2.4 for Red Hat Enterprise Linux. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\n\n3. \n\nThe httpd24 Software Collection has been upgraded to version 2.4.25, which\nprovides a number of bug fixes and enhancements over the previous version. \nFor detailed changes, see the Red Hat Software Collections 2.4 Release\nNotes linked from the References section. (BZ#1404778)\n\nSecurity Fix(es):\n\n* It was discovered that the mod_session_crypto module of httpd did not use\nany mechanisms to verify integrity of the encrypted session data stored in\nthe user\u0027s browser. A remote attacker could use this flaw to decrypt and\nmodify session data using a padding oracle attack. (CVE-2016-0736)\n\n* A denial of service flaw was found in httpd\u0027s mod_http2 module. A remote\nattacker could use this flaw to block server threads for long times,\ncausing starvation of worker threads, by manipulating the flow control\nwindows on streams. (CVE-2016-1546)\n\n* It was discovered that the mod_auth_digest module of httpd did not\nproperly check for memory allocation failures. A remote attacker could use\nthis flaw to cause httpd child processes to repeatedly crash if the server\nused HTTP digest authentication. (CVE-2016-2161)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed\ncertain characters not permitted by the HTTP protocol specification to\nappear unencoded in HTTP request headers. If httpd was used in conjunction\nwith a proxy or backend server that interpreted those characters\ndifferently, a remote attacker could possibly use this flaw to inject data\ninto HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\nNote: The fix for the CVE-2016-8743 issue causes httpd to return \"400 Bad\nRequest\" error to HTTP clients which do not strictly follow HTTP protocol\nspecification. A newly introduced configuration directive\n\"HttpProtocolOptions Unsafe\" can be used to re-enable the old less strict\nparsing. However, such setting also re-introduces the CVE-2016-8743 issue. \n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields\ndirective in mod_http2, affecting servers with HTTP/2 enabled. An attacker\ncould send crafted requests with headers larger than the server\u0027s available\nmemory, causing httpd to crash. (CVE-2016-8740)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1329639 - error in service httpd24-httpd configtest\n1335616 - Backport Apache PR58118 to fix mod_proxy_fcgi spamming non-errors: AH01075: Error dispatching request to : (passing brigade to output filters)\n1336350 - CVE-2016-1546 httpd: mod_http2 denial-of-service by thread starvation\n1401528 - CVE-2016-8740 httpd: Incomplete handling of LimitRequestFields directive in mod_http2\n1406744 - CVE-2016-0736 httpd: Padding Oracle in Apache mod_session_crypto\n1406753 - CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest\n1406822 - CVE-2016-8743 httpd: Apache HTTP Request Parsing Whitespace Defects\n1414037 - mod_proxy_fcgi regression in 2.4.23+\n1432249 - must fail startup with conflicting Listen directives\n1433474 - wrong requires of httpd24-httpd and httpd24-httpd-tools\n\n6. Package List:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):\n\nSource:\nhttpd24-httpd-2.4.25-9.el6.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.25-9.el6.noarch.rpm\n\nx86_64:\nhttpd24-httpd-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-devel-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-tools-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_ldap-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_session-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_ssl-2.4.25-9.el6.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):\n\nSource:\nhttpd24-httpd-2.4.25-9.el6.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.25-9.el6.noarch.rpm\n\nx86_64:\nhttpd24-httpd-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-devel-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-tools-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_ldap-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_session-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_ssl-2.4.25-9.el6.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nhttpd24-httpd-2.4.25-9.el6.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.25-9.el6.noarch.rpm\n\nx86_64:\nhttpd24-httpd-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-devel-2.4.25-9.el6.x86_64.rpm\nhttpd24-httpd-tools-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_ldap-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_session-2.4.25-9.el6.x86_64.rpm\nhttpd24-mod_ssl-2.4.25-9.el6.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nhttpd24-httpd-2.4.25-9.el7.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.25-9.el7.noarch.rpm\n\nx86_64:\nhttpd24-httpd-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-devel-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-tools-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_ldap-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_session-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_ssl-2.4.25-9.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\nhttpd24-httpd-2.4.25-9.el7.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.25-9.el7.noarch.rpm\n\nx86_64:\nhttpd24-httpd-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-devel-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-tools-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_ldap-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_session-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_ssl-2.4.25-9.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nhttpd24-httpd-2.4.25-9.el7.src.rpm\n\nnoarch:\nhttpd24-httpd-manual-2.4.25-9.el7.noarch.rpm\n\nx86_64:\nhttpd24-httpd-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-debuginfo-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-devel-2.4.25-9.el7.x86_64.rpm\nhttpd24-httpd-tools-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_ldap-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_proxy_html-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_session-2.4.25-9.el7.x86_64.rpm\nhttpd24-mod_ssl-2.4.25-9.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-0736\nhttps://access.redhat.com/security/cve/CVE-2016-1546\nhttps://access.redhat.com/security/cve/CVE-2016-2161\nhttps://access.redhat.com/security/cve/CVE-2016-8740\nhttps://access.redhat.com/security/cve/CVE-2016-8743\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Software_Collections/2/html/2.4_Release_Notes/chap-RHSCL.html#sect-RHSCL-Changes-httpd\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZAJq1XlSAg2UNWIIRAlGKAJ9zNHkvJQ9/I+imHbgRwjelvV9xKgCeLyYO\nSjFZr+hN7gjeQOgcC0kswCY=\n=m+ZH\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux03725en_us\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: hpesbux03725en_us\nVersion: 1\n\nHPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple\nVulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2017-03-29\nLast Updated: 2017-03-29\n\nPotential Security Impact: Remote: Denial of Service (DoS), Unauthorized Read\nAccess to Data\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX Web Server\nSuite running Apache on HP-UX 11iv3. \n\n - HP-UX Apache-based Web Server B.11.31 - httpd prior to B.2.4.18.02\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2016-0736\n 0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\n 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)\n\n CVE-2016-2161\n 0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\n 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)\n\n CVE-2016-2183\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)\n\n CVE-2016-8740\n 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)\n\n CVE-2016-8743\n 0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\n 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE has provided the following software updates to resolve the\nvulnerabilities with HP-UX Web Server Suite running Apache. \n\nApache 2.4.18.02 for HP-UX Release B.11.31 (PA and IA):\n\n * 32 bit Depot: HP-UX 11.31(HPUXWS24ATW-B503-11-31-64.depot)\n * 64 bit Depot: HP-UX 11.31(HPUXWS24ATW-B503-11-31-32.depot)\n\n**Note:** The depot files can be found here:\n\u003chttps://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb\nr=HPUXWSATW503\u003e\n\nMANUAL ACTIONS: Yes - Update \nDownload and install the software update \n\nPRODUCT SPECIFIC INFORMATION \nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\n\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins \nissued by HPE and lists recommended actions that may apply to a specific\nHP-UX \nsystem. It can also download patches and create a depot automatically. For\nmore information see: \n\u003chttps://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb\nr=B6834AA\u003e\n\n AFFECTED VERSIONS \n\n\n HP-UX B.11.31 IA/PA\n ===================\n\n hpuxws24APACHE.APACHE\n hpuxws24APACHE.APACHE2\n hpuxws24APACHE.AUTH_LDAP\n hpuxws24APACHE.AUTH_LDAP2\n hpuxws24APACHE.MOD_JK\n hpuxws24APACHE.MOD_JK2\n hpuxws24APACHE.MOD_PERL\n hpuxws24APACHE.MOD_PERL2\n hpuxws24APACHE.WEBPROXY\n hpuxws24APACHE.WEBPROXY2\n\n action: install B.2.4.18.02 or subsequent\n\n END AFFECTED VERSIONS\n\n\nHISTORY\nVersion:1 (rev.1) - 29 March 2017 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. ==========================================================================\nUbuntu Security Notice USN-3279-1\nMay 09, 2017\n\napache2 vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.10\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Apache HTTP Server. \n\nSoftware Description:\n- apache2: Apache HTTP server\n\nDetails:\n\nIt was discovered that the Apache mod_session_crypto module was encrypting\ndata and cookies using either CBC or ECB modes. (CVE-2016-0736)\n\nMaksim Malyutin discovered that the Apache mod_auth_digest module\nincorrectly handled malicious input. A new configuration option \"HttpProtocolOptions Unsafe\" can\nbe used to revert to the previous unsafe behaviour in problematic\nenvironments. (CVE-2016-8743)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.10:\n apache2-bin 2.4.18-2ubuntu4.1\n\nUbuntu 16.04 LTS:\n apache2-bin 2.4.18-2ubuntu3.2\n\nUbuntu 14.04 LTS:\n apache2-bin 2.4.7-1ubuntu4.14\n\nIn general, a standard system update will make all the necessary changes",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8743"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"db": "BID",
"id": "95077"
},
{
"db": "VULMON",
"id": "CVE-2016-8743"
},
{
"db": "PACKETSTORM",
"id": "142848"
},
{
"db": "PACKETSTORM",
"id": "142847"
},
{
"db": "PACKETSTORM",
"id": "142849"
},
{
"db": "PACKETSTORM",
"id": "144827"
},
{
"db": "PACKETSTORM",
"id": "142326"
},
{
"db": "PACKETSTORM",
"id": "141862"
},
{
"db": "PACKETSTORM",
"id": "142434"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8743",
"trust": 4.3
},
{
"db": "BID",
"id": "95077",
"trust": 1.9
},
{
"db": "SECTRACK",
"id": "1037508",
"trust": 1.6
},
{
"db": "TENABLE",
"id": "TNS-2017-04",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU99304449",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008607",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2019.4748",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.1415",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201612-648",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2016-8743",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142848",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142847",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142849",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "144827",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142326",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "141862",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142434",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2016-8743"
},
{
"db": "BID",
"id": "95077"
},
{
"db": "PACKETSTORM",
"id": "142848"
},
{
"db": "PACKETSTORM",
"id": "142847"
},
{
"db": "PACKETSTORM",
"id": "142849"
},
{
"db": "PACKETSTORM",
"id": "144827"
},
{
"db": "PACKETSTORM",
"id": "142326"
},
{
"db": "PACKETSTORM",
"id": "141862"
},
{
"db": "PACKETSTORM",
"id": "142434"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"db": "NVD",
"id": "CVE-2016-8743"
}
]
},
"id": "VAR-201707-0556",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.206875005
},
"last_update_date": "2025-12-19T20:20:00.735000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "hitachi-sec-2018-103",
"trust": 0.8,
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"title": "Apache httpd Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66668"
},
{
"title": "Red Hat: Moderate: httpd security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171721 - Security Advisory"
},
{
"title": "Red Hat: Moderate: httpd security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20170906 - Security Advisory"
},
{
"title": "Red Hat: Moderate: httpd24-httpd security, bug fix, and enhancement update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171161 - Security Advisory"
},
{
"title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171414 - Security Advisory"
},
{
"title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171415 - Security Advisory"
},
{
"title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171413 - Security Advisory"
},
{
"title": "Amazon Linux AMI: ALAS-2017-851",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2017-851"
},
{
"title": "Debian Security Advisories: DSA-3796-1 apache2 -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=0cabff5d756c97f9d71c1cafff6a8acc"
},
{
"title": "Ubuntu Security Notice: apache2 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3279-1"
},
{
"title": "Ubuntu Security Notice: apache2 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3373-1"
},
{
"title": "Debian CVElist Bug Report Logs: apache2: CVE-2016-8740: erver memory can be exhausted and service denied when HTTP/2 is used",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=d7fc65c11d6c61493afd8cf310064550"
},
{
"title": "Amazon Linux AMI: ALAS-2017-785",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2017-785"
},
{
"title": "Amazon Linux AMI: ALAS-2017-863",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2017-863"
},
{
"title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2017",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=a2bac27fb002bed513645d4775c7275b"
},
{
"title": "IBM: IBM Security Bulletin: IBM Cognos Controller 2019Q2 Security Updater: Multiple vulnerabilities have been identified in IBM Cognos Controller",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=38227211accce022b0a3d9b56a974186"
},
{
"title": "Oracle Linux Bulletins: Oracle Linux Bulletin - July 2017",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=549dc795290b298746065b62b4bb7928"
},
{
"title": "Tenable Security Advisories: [R5] SecurityCenter 5.4.3 Fixes Multiple Vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2017-04"
},
{
"title": "Oracle: Oracle Critical Patch Update Advisory - April 2017",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=143b3fb255063c81571469eaa3cf0a87"
},
{
"title": "Oracle Linux Bulletins: Oracle Linux Bulletin - April 2017",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=d78b3379ca364568964f30138964c7e7"
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/Live-Hack-CVE/CVE-2016-8743 "
},
{
"title": "DC-3-Vulnhub-Walkthrough",
"trust": 0.1,
"url": "https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough "
},
{
"title": "DC-2-Vulnhub-Walkthrough",
"trust": 0.1,
"url": "https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough "
},
{
"title": "Basic-Pentesting-2-Vulnhub-Walkthrough",
"trust": 0.1,
"url": "https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/bioly230/THM_Skynet "
},
{
"title": "Basic-Pentesting-2",
"trust": 0.1,
"url": "https://github.com/vshaliii/Basic-Pentesting-2 "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/NikulinMS/13-01-hw "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2016-8743"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "Data processing (CWE-19) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"db": "NVD",
"id": "CVE-2016-8743"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://access.redhat.com/errata/rhsa-2017:1413"
},
{
"trust": 1.7,
"url": "http://rhn.redhat.com/errata/rhsa-2017-1415.html"
},
{
"trust": 1.7,
"url": "https://access.redhat.com/errata/rhsa-2017:1414"
},
{
"trust": 1.7,
"url": "https://access.redhat.com/errata/rhsa-2017:1161"
},
{
"trust": 1.6,
"url": "https://support.apple.com/ht208221"
},
{
"trust": 1.6,
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"trust": 1.6,
"url": "https://access.redhat.com/errata/rhsa-2017:0906"
},
{
"trust": 1.6,
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbmu03753en_us"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/95077"
},
{
"trust": 1.6,
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"trust": 1.6,
"url": "http://www.securitytracker.com/id/1037508"
},
{
"trust": 1.6,
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"trust": 1.6,
"url": "https://access.redhat.com/errata/rhsa-2017:1721"
},
{
"trust": 1.6,
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbux03725en_us"
},
{
"trust": 1.6,
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"trust": 1.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8743"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#cve-2016-8743"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.0,
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu99304449/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-4975"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-2161"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8740"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-0736"
},
{
"trust": 0.6,
"url": "httpd.apache.org%3e"
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3ccvs."
},
{
"trust": 0.6,
"url": "httpd.apache.org/security/vulnerabilities_24.html#cve-2016-8743"
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3ccvs."
},
{
"trust": 0.6,
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10715641"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.4748/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/79678"
},
{
"trust": 0.6,
"url": "https://www.ibm.com/support/pages/node/1138588"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2016-8740"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2016-0736"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2016-8743"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.4,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.4,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2016-2161"
},
{
"trust": 0.3,
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"trust": 0.3,
"url": "http://www.apache.org"
},
{
"trust": 0.3,
"url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbmu03753en_us"
},
{
"trust": 0.3,
"url": "https://www.oracle.com/technetwork/topics/security/linuxbulletinjul2017-3832368.html"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2016-8610"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8610"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-7056"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2016-6304"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2016-7056"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-6304"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.2,
"url": "https://issues.jboss.org/):"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.apachehttp\u0026downloadtype=securitypatches\u0026version=2.4.23"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-5387"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12896"
},
{
"trust": 0.1,
"url": "https://support.apple.com/kb/ht201222"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-11543"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12895"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12893"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12897"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12898"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-11542"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12986"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-11108"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000100"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1298"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-11541"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-11103"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-4736"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12901"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12894"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12985"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12899"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12900"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12902"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000101"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/downloads/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12987"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_software_collections/2/html/2.4_release_notes/chap-rhscl.html#sect-rhscl-changes-httpd"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2016-1546"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-1546"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.1,
"url": "http://www.hpe.com/support/security_bulletin_archive"
},
{
"trust": 0.1,
"url": "https://www.hpe.com/info/report-security-vulnerability"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbux03725en_us"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499"
},
{
"trust": 0.1,
"url": "https://h20392.www2.hpe.com/portal/swdepot/displayproductinfo.do?productnumb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-2183"
},
{
"trust": 0.1,
"url": "http://www.hpe.com/support/subscriber_choice"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apache2/2.4.18-2ubuntu4.1"
},
{
"trust": 0.1,
"url": "http://www.ubuntu.com/usn/usn-3279-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apache2/2.4.18-2ubuntu3.2"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/apache2/2.4.7-1ubuntu4.14"
}
],
"sources": [
{
"db": "BID",
"id": "95077"
},
{
"db": "PACKETSTORM",
"id": "142848"
},
{
"db": "PACKETSTORM",
"id": "142847"
},
{
"db": "PACKETSTORM",
"id": "142849"
},
{
"db": "PACKETSTORM",
"id": "144827"
},
{
"db": "PACKETSTORM",
"id": "142326"
},
{
"db": "PACKETSTORM",
"id": "141862"
},
{
"db": "PACKETSTORM",
"id": "142434"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"db": "NVD",
"id": "CVE-2016-8743"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2016-8743"
},
{
"db": "BID",
"id": "95077"
},
{
"db": "PACKETSTORM",
"id": "142848"
},
{
"db": "PACKETSTORM",
"id": "142847"
},
{
"db": "PACKETSTORM",
"id": "142849"
},
{
"db": "PACKETSTORM",
"id": "144827"
},
{
"db": "PACKETSTORM",
"id": "142326"
},
{
"db": "PACKETSTORM",
"id": "141862"
},
{
"db": "PACKETSTORM",
"id": "142434"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"db": "NVD",
"id": "CVE-2016-8743"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-27T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8743"
},
{
"date": "2016-12-20T00:00:00",
"db": "BID",
"id": "95077"
},
{
"date": "2017-06-07T22:47:57",
"db": "PACKETSTORM",
"id": "142848"
},
{
"date": "2017-06-07T22:47:43",
"db": "PACKETSTORM",
"id": "142847"
},
{
"date": "2017-06-07T22:48:07",
"db": "PACKETSTORM",
"id": "142849"
},
{
"date": "2017-11-01T15:41:26",
"db": "PACKETSTORM",
"id": "144827"
},
{
"date": "2017-04-26T16:05:26",
"db": "PACKETSTORM",
"id": "142326"
},
{
"date": "2017-03-30T16:04:18",
"db": "PACKETSTORM",
"id": "141862"
},
{
"date": "2017-05-09T22:22:00",
"db": "PACKETSTORM",
"id": "142434"
},
{
"date": "2016-12-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-648"
},
{
"date": "2017-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"date": "2017-07-27T21:29:00.287000",
"db": "NVD",
"id": "CVE-2016-8743"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-11-07T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8743"
},
{
"date": "2017-09-27T18:00:00",
"db": "BID",
"id": "95077"
},
{
"date": "2022-09-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-648"
},
{
"date": "2023-06-29T00:58:00",
"db": "JVNDB",
"id": "JVNDB-2016-008607"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2016-8743"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "142434"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
}
],
"trust": 0.7
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cosminexus\u00a0HTTP\u00a0Server\u00a0 and \u00a0Hitachi\u00a0Web\u00a0Server\u00a0 Vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008607"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-648"
}
],
"trust": 0.6
}
}
GSD-2016-8743
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2016-8743",
"description": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"id": "GSD-2016-8743",
"references": [
"https://www.suse.com/security/cve/CVE-2016-8743.html",
"https://www.debian.org/security/2017/dsa-3796",
"https://access.redhat.com/errata/RHSA-2017:1721",
"https://access.redhat.com/errata/RHSA-2017:1415",
"https://access.redhat.com/errata/RHSA-2017:1414",
"https://access.redhat.com/errata/RHSA-2017:1413",
"https://access.redhat.com/errata/RHSA-2017:1161",
"https://access.redhat.com/errata/RHSA-2017:0906",
"https://ubuntu.com/security/CVE-2016-8743",
"https://advisories.mageia.org/CVE-2016-8743.html",
"https://alas.aws.amazon.com/cve/html/CVE-2016-8743.html",
"https://linux.oracle.com/cve/CVE-2016-8743.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-8743"
],
"details": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
"id": "GSD-2016-8743",
"modified": "2023-12-13T01:21:22.721896Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2016-12-20T00:00:00",
"ID": "CVE-2016-8743",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value": "2.2.0 to 2.2.31, 2.4.1 to 2.4.23"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Request Smuggling, Response Splitting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT208221",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208221"
},
{
"name": "DSA-3796",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "RHSA-2017:1721",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"name": "1037508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "RHSA-2017:1413",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "RHSA-2017:1414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us"
},
{
"name": "95077",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95077"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"name": "RHSA-2017:1415",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "RHSA-2017:0906",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"name": "GLSA-201701-36",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180423-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888217 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073163 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888221 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073161 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.4.23",
"versionStartIncluding": "2.4.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.2.31",
"versionStartIncluding": "2.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2016-8743"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"name": "GLSA-201701-36",
"refsource": "GENTOO",
"tags": [
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"name": "1037508",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "95077",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95077"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us"
},
{
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "DSA-3796",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "https://support.apple.com/HT208221",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/HT208221"
},
{
"name": "RHSA-2017:1721",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"name": "RHSA-2017:1414",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"name": "RHSA-2017:1413",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"name": "RHSA-2017:0906",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"name": "RHSA-2017:1415",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180423-0001/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073163 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888221 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073161 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2016-8743.json security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888217 - /httpd/site/trunk/content/security/json/CVE-2016-8743.json",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-09-07T17:39Z",
"publishedDate": "2017-07-27T21:29Z"
}
}
}
WID-SEC-W-2025-0370
Vulnerability from csaf_certbund - Published: 2017-09-25 22:00 - Updated: 2025-02-13 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple Mac OS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstelle in Apple Mac OS ausnutzen, um Code mit Kernel Privilegien auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0370 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2025-0370.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0370 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0370"
},
{
"category": "external",
"summary": "Apple Security Advisory HT208144 vom 2017-09-25",
"url": "https://support.apple.com/de-de/HT208144"
},
{
"category": "external",
"summary": "Updated Apple Security Advisory HT208144 vom 2017-10-31",
"url": "https://lists.apple.com/archives/security-announce/2017/Oct/msg00007.html"
},
{
"category": "external",
"summary": "Updated Apple Security Advisory HT208144 vom 2017-10-31",
"url": "https://lists.apple.com/archives/security-announce/2017/Oct/msg00001.html"
}
],
"source_lang": "en-US",
"title": "Apple Mac OS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-02-13T23:00:00.000+00:00",
"generator": {
"date": "2025-02-14T12:00:12.636+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0370",
"initial_release_date": "2017-09-25T22:00:00.000+00:00",
"revision_history": [
{
"date": "2017-09-25T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2017-10-31T23:00:00.000+00:00",
"number": "2",
"summary": "cve added"
},
{
"date": "2017-10-31T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-10-31T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-11-21T23:00:00.000+00:00",
"number": "5",
"summary": "cve added"
},
{
"date": "2017-11-21T23:00:00.000+00:00",
"number": "6",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-12-13T23:00:00.000+00:00",
"number": "7",
"summary": "New remediations available"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "8",
"summary": "Korrektur"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.13",
"product": {
"name": "Apple macOS \u003c10.13",
"product_id": "T010822"
}
},
{
"category": "product_version",
"name": "10.13",
"product": {
"name": "Apple macOS 10.13",
"product_id": "T010822-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:10.13"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-0736"
},
{
"cve": "CVE-2016-2161",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-2161"
},
{
"cve": "CVE-2016-4736",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-4736"
},
{
"cve": "CVE-2016-5387",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-5387"
},
{
"cve": "CVE-2016-8740",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-8740"
},
{
"cve": "CVE-2016-8743",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-8743"
},
{
"cve": "CVE-2016-9042",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-9042"
},
{
"cve": "CVE-2016-9063",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-9063"
},
{
"cve": "CVE-2016-9840",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-9840"
},
{
"cve": "CVE-2016-9841",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-9841"
},
{
"cve": "CVE-2016-9842",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-9842"
},
{
"cve": "CVE-2016-9843",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2016-9843"
},
{
"cve": "CVE-2017-0381",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-0381"
},
{
"cve": "CVE-2017-1000100",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-1000100"
},
{
"cve": "CVE-2017-1000101",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-1000101"
},
{
"cve": "CVE-2017-1000373",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-1000373"
},
{
"cve": "CVE-2017-10140",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-10140"
},
{
"cve": "CVE-2017-10989",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-10989"
},
{
"cve": "CVE-2017-11103",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-11103"
},
{
"cve": "CVE-2017-11108",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-11108"
},
{
"cve": "CVE-2017-11541",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-11541"
},
{
"cve": "CVE-2017-11542",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-11542"
},
{
"cve": "CVE-2017-11543",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-11543"
},
{
"cve": "CVE-2017-12893",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12893"
},
{
"cve": "CVE-2017-12894",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12894"
},
{
"cve": "CVE-2017-12895",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12895"
},
{
"cve": "CVE-2017-12896",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12896"
},
{
"cve": "CVE-2017-12897",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12897"
},
{
"cve": "CVE-2017-12898",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12898"
},
{
"cve": "CVE-2017-12899",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12899"
},
{
"cve": "CVE-2017-12900",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12900"
},
{
"cve": "CVE-2017-12901",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12901"
},
{
"cve": "CVE-2017-12902",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12902"
},
{
"cve": "CVE-2017-12985",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12985"
},
{
"cve": "CVE-2017-12986",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12986"
},
{
"cve": "CVE-2017-12987",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12987"
},
{
"cve": "CVE-2017-12988",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12988"
},
{
"cve": "CVE-2017-12989",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12989"
},
{
"cve": "CVE-2017-12990",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12990"
},
{
"cve": "CVE-2017-12991",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12991"
},
{
"cve": "CVE-2017-12992",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12992"
},
{
"cve": "CVE-2017-12993",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12993"
},
{
"cve": "CVE-2017-12994",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12994"
},
{
"cve": "CVE-2017-12995",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12995"
},
{
"cve": "CVE-2017-12996",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12996"
},
{
"cve": "CVE-2017-12997",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12997"
},
{
"cve": "CVE-2017-12998",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12998"
},
{
"cve": "CVE-2017-12999",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-12999"
},
{
"cve": "CVE-2017-13000",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13000"
},
{
"cve": "CVE-2017-13001",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13001"
},
{
"cve": "CVE-2017-13002",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13002"
},
{
"cve": "CVE-2017-13003",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13003"
},
{
"cve": "CVE-2017-13004",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13004"
},
{
"cve": "CVE-2017-13005",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13005"
},
{
"cve": "CVE-2017-13006",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13006"
},
{
"cve": "CVE-2017-13007",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13007"
},
{
"cve": "CVE-2017-13008",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13008"
},
{
"cve": "CVE-2017-13009",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13009"
},
{
"cve": "CVE-2017-13010",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13010"
},
{
"cve": "CVE-2017-13011",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13011"
},
{
"cve": "CVE-2017-13012",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13012"
},
{
"cve": "CVE-2017-13013",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13013"
},
{
"cve": "CVE-2017-13014",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13014"
},
{
"cve": "CVE-2017-13015",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13015"
},
{
"cve": "CVE-2017-13016",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13016"
},
{
"cve": "CVE-2017-13017",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13017"
},
{
"cve": "CVE-2017-13018",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13018"
},
{
"cve": "CVE-2017-13019",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13019"
},
{
"cve": "CVE-2017-13020",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13020"
},
{
"cve": "CVE-2017-13021",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13021"
},
{
"cve": "CVE-2017-13022",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13022"
},
{
"cve": "CVE-2017-13023",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13023"
},
{
"cve": "CVE-2017-13024",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13024"
},
{
"cve": "CVE-2017-13025",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13025"
},
{
"cve": "CVE-2017-13026",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13026"
},
{
"cve": "CVE-2017-13027",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13027"
},
{
"cve": "CVE-2017-13028",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13028"
},
{
"cve": "CVE-2017-13029",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13029"
},
{
"cve": "CVE-2017-13030",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13030"
},
{
"cve": "CVE-2017-13031",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13031"
},
{
"cve": "CVE-2017-13032",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13032"
},
{
"cve": "CVE-2017-13033",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13033"
},
{
"cve": "CVE-2017-13034",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13034"
},
{
"cve": "CVE-2017-13035",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13035"
},
{
"cve": "CVE-2017-13036",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13036"
},
{
"cve": "CVE-2017-13037",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13037"
},
{
"cve": "CVE-2017-13038",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13038"
},
{
"cve": "CVE-2017-13039",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13039"
},
{
"cve": "CVE-2017-13040",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13040"
},
{
"cve": "CVE-2017-13041",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13041"
},
{
"cve": "CVE-2017-13042",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13042"
},
{
"cve": "CVE-2017-13043",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13043"
},
{
"cve": "CVE-2017-13044",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13044"
},
{
"cve": "CVE-2017-13045",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13045"
},
{
"cve": "CVE-2017-13046",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13046"
},
{
"cve": "CVE-2017-13047",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13047"
},
{
"cve": "CVE-2017-13048",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13048"
},
{
"cve": "CVE-2017-13049",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13049"
},
{
"cve": "CVE-2017-13050",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13050"
},
{
"cve": "CVE-2017-13051",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13051"
},
{
"cve": "CVE-2017-13052",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13052"
},
{
"cve": "CVE-2017-13053",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13053"
},
{
"cve": "CVE-2017-13054",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13054"
},
{
"cve": "CVE-2017-13055",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13055"
},
{
"cve": "CVE-2017-13077",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13077"
},
{
"cve": "CVE-2017-13078",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13078"
},
{
"cve": "CVE-2017-13080",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-13687",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13687"
},
{
"cve": "CVE-2017-13688",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13688"
},
{
"cve": "CVE-2017-13689",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13689"
},
{
"cve": "CVE-2017-13690",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13690"
},
{
"cve": "CVE-2017-13725",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13725"
},
{
"cve": "CVE-2017-13782",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13782"
},
{
"cve": "CVE-2017-13786",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13786"
},
{
"cve": "CVE-2017-13799",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13799"
},
{
"cve": "CVE-2017-13800",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13800"
},
{
"cve": "CVE-2017-13801",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13801"
},
{
"cve": "CVE-2017-13804",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13804"
},
{
"cve": "CVE-2017-13807",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13807"
},
{
"cve": "CVE-2017-13808",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13808"
},
{
"cve": "CVE-2017-13809",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13809"
},
{
"cve": "CVE-2017-13810",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13810"
},
{
"cve": "CVE-2017-13811",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13811"
},
{
"cve": "CVE-2017-13812",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13812"
},
{
"cve": "CVE-2017-13813",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13813"
},
{
"cve": "CVE-2017-13814",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13814"
},
{
"cve": "CVE-2017-13815",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13815"
},
{
"cve": "CVE-2017-13816",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13816"
},
{
"cve": "CVE-2017-13817",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13817"
},
{
"cve": "CVE-2017-13818",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13818"
},
{
"cve": "CVE-2017-13819",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13819"
},
{
"cve": "CVE-2017-13820",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13820"
},
{
"cve": "CVE-2017-13821",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13821"
},
{
"cve": "CVE-2017-13822",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13822"
},
{
"cve": "CVE-2017-13823",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13823"
},
{
"cve": "CVE-2017-13824",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13824"
},
{
"cve": "CVE-2017-13825",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13825"
},
{
"cve": "CVE-2017-13826",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13826"
},
{
"cve": "CVE-2017-13827",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13827"
},
{
"cve": "CVE-2017-13828",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13828"
},
{
"cve": "CVE-2017-13829",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13829"
},
{
"cve": "CVE-2017-13830",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13830"
},
{
"cve": "CVE-2017-13831",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13831"
},
{
"cve": "CVE-2017-13832",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13832"
},
{
"cve": "CVE-2017-13833",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13833"
},
{
"cve": "CVE-2017-13834",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13834"
},
{
"cve": "CVE-2017-13836",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13836"
},
{
"cve": "CVE-2017-13837",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13837"
},
{
"cve": "CVE-2017-13838",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13838"
},
{
"cve": "CVE-2017-13839",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13839"
},
{
"cve": "CVE-2017-13840",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13840"
},
{
"cve": "CVE-2017-13841",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13841"
},
{
"cve": "CVE-2017-13842",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13842"
},
{
"cve": "CVE-2017-13843",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13843"
},
{
"cve": "CVE-2017-13846",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13846"
},
{
"cve": "CVE-2017-13851",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13851"
},
{
"cve": "CVE-2017-13854",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-13854"
},
{
"cve": "CVE-2017-3167",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-3167"
},
{
"cve": "CVE-2017-3169",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-3169"
},
{
"cve": "CVE-2017-6451",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6451"
},
{
"cve": "CVE-2017-6452",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6452"
},
{
"cve": "CVE-2017-6455",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6455"
},
{
"cve": "CVE-2017-6458",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6458"
},
{
"cve": "CVE-2017-6459",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6459"
},
{
"cve": "CVE-2017-6460",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6460"
},
{
"cve": "CVE-2017-6462",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6462"
},
{
"cve": "CVE-2017-6463",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6463"
},
{
"cve": "CVE-2017-6464",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-6464"
},
{
"cve": "CVE-2017-7074",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7074"
},
{
"cve": "CVE-2017-7077",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7077"
},
{
"cve": "CVE-2017-7078",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7078"
},
{
"cve": "CVE-2017-7080",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7080"
},
{
"cve": "CVE-2017-7082",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7082"
},
{
"cve": "CVE-2017-7083",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7083"
},
{
"cve": "CVE-2017-7084",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7084"
},
{
"cve": "CVE-2017-7086",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7086"
},
{
"cve": "CVE-2017-7114",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7114"
},
{
"cve": "CVE-2017-7119",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7119"
},
{
"cve": "CVE-2017-7121",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7121"
},
{
"cve": "CVE-2017-7122",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7122"
},
{
"cve": "CVE-2017-7123",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7123"
},
{
"cve": "CVE-2017-7124",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7124"
},
{
"cve": "CVE-2017-7125",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7125"
},
{
"cve": "CVE-2017-7126",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7126"
},
{
"cve": "CVE-2017-7127",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7127"
},
{
"cve": "CVE-2017-7128",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7128"
},
{
"cve": "CVE-2017-7129",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7129"
},
{
"cve": "CVE-2017-7130",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7130"
},
{
"cve": "CVE-2017-7132",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7132"
},
{
"cve": "CVE-2017-7138",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7138"
},
{
"cve": "CVE-2017-7141",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7141"
},
{
"cve": "CVE-2017-7143",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7143"
},
{
"cve": "CVE-2017-7144",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7144"
},
{
"cve": "CVE-2017-7659",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7659"
},
{
"cve": "CVE-2017-7668",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7668"
},
{
"cve": "CVE-2017-7679",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-7679"
},
{
"cve": "CVE-2017-9233",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-9233"
},
{
"cve": "CVE-2017-9788",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-9788"
},
{
"cve": "CVE-2017-9789",
"product_status": {
"known_affected": [
"T010822"
]
},
"release_date": "2017-09-25T22:00:00.000+00:00",
"title": "CVE-2017-9789"
}
]
}
CNVD-2016-13233
Vulnerability from cnvd - Published: 2016-12-28目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://httpd.apache.org/security/vulnerabilities_24.html
| Name | Apache HTTP Server <2.4.25 |
|---|
{
"bids": {
"bid": {
"bidNumber": "95077"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-8743"
}
},
"description": "Apache httpd\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u4e13\u4e3a\u73b0\u4ee3\u64cd\u4f5c\u7cfb\u7edf\u5f00\u53d1\u548c\u7ef4\u62a4\u7684\u5f00\u6e90HTTP\u670d\u52a1\u5668\u3002\r\n\r\nApache httpd 2.4.25\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u89e3\u6790HTTP\u5934\u6570\u636e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u63d0\u4ea4\u7279\u5236\u7684URL\u4f2a\u9020\u76ee\u6807\u670d\u52a1\u5668\u5185\u5bb9\uff0c\u9020\u6210Web\u7f13\u5b58\u4e2d\u6bd2\u6216\u5b9e\u65bd\u8de8\u7ad9\u811a\u672c\u653b\u51fb\u3002",
"discovererName": "David Dennerline at IBM Security\u0027s X-Force Researchers as well as Regis Leroy",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://httpd.apache.org/security/vulnerabilities_24.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-13233",
"openTime": "2016-12-28",
"patchDescription": "Apache httpd\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u4e13\u4e3a\u73b0\u4ee3\u64cd\u4f5c\u7cfb\u7edf\u5f00\u53d1\u548c\u7ef4\u62a4\u7684\u5f00\u6e90HTTP\u670d\u52a1\u5668\u3002\r\n\r\nApache httpd 2.4.25\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u89e3\u6790HTTP\u5934\u6570\u636e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u63d0\u4ea4\u7279\u5236\u7684URL\u4f2a\u9020\u76ee\u6807\u670d\u52a1\u5668\u5185\u5bb9\uff0c\u9020\u6210Web\u7f13\u5b58\u4e2d\u6bd2\u6216\u5b9e\u65bd\u8de8\u7ad9\u811a\u672c\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apache HTTP Server\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2016-13233\uff09\u7684\u8865\u4e01",
"products": {
"product": "Apache HTTP Server \u003c2.4.25"
},
"referenceLink": "http://www.securityfocus.com/bid/95077",
"serverity": "\u4e2d",
"submitTime": "2016-12-26",
"title": "Apache HTTP Server\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2016-13233\uff09"
}
FKIE_CVE-2016-8743
Vulnerability from fkie_nvd - Published: 2017-07-27 21:29 - Updated: 2025-04-20 01:37| URL | Tags | ||
|---|---|---|---|
| security@apache.org | http://rhn.redhat.com/errata/RHSA-2017-1415.html | Third Party Advisory | |
| security@apache.org | http://www.debian.org/security/2017/dsa-3796 | Third Party Advisory | |
| security@apache.org | http://www.securityfocus.com/bid/95077 | Third Party Advisory, VDB Entry | |
| security@apache.org | http://www.securitytracker.com/id/1037508 | Broken Link, Third Party Advisory, VDB Entry | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:0906 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:1161 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:1413 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:1414 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:1721 | Third Party Advisory | |
| security@apache.org | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us | Third Party Advisory | |
| security@apache.org | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us | Third Party Advisory | |
| security@apache.org | https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743 | Vendor Advisory | |
| security@apache.org | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://security.gentoo.org/glsa/201701-36 | Patch, Third Party Advisory, VDB Entry | |
| security@apache.org | https://security.netapp.com/advisory/ntap-20180423-0001/ | Third Party Advisory | |
| security@apache.org | https://support.apple.com/HT208221 | Third Party Advisory | |
| security@apache.org | https://www.tenable.com/security/tns-2017-04 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-1415.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3796 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95077 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037508 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:0906 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1161 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1413 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1414 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1721 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-36 | Patch, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180423-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208221 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2017-04 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | http_server | * | |
| apache | http_server | * | |
| netapp | clustered_data_ontap | - | |
| netapp | oncommand_unified_manager | - | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_eus | 7.3 | |
| redhat | enterprise_linux_eus | 7.4 | |
| redhat | enterprise_linux_eus | 7.5 | |
| redhat | enterprise_linux_eus | 7.6 | |
| redhat | enterprise_linux_eus | 7.7 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_aus | 7.3 | |
| redhat | enterprise_linux_server_aus | 7.4 | |
| redhat | enterprise_linux_server_aus | 7.6 | |
| redhat | enterprise_linux_server_aus | 7.7 | |
| redhat | enterprise_linux_server_tus | 7.3 | |
| redhat | enterprise_linux_server_tus | 7.6 | |
| redhat | enterprise_linux_server_tus | 7.7 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| redhat | enterprise_linux_workstation | 7.0 | |
| redhat | jboss_core_services | 1.0 | |
| redhat | enterprise_linux | 6.0 | |
| redhat | enterprise_linux | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3E7037D-2C83-4F09-8DC6-4C51D447727A",
"versionEndIncluding": "2.2.31",
"versionStartIncluding": "2.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8805C987-A5BB-403B-BB9F-B745A2AE7865",
"versionEndIncluding": "2.4.23",
"versionStartIncluding": "2.4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
"matchCriteriaId": "3FA5E22C-489B-4C5F-A5F3-C03F45CA8811",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2466282-51AB-478D-9FF4-FA524265ED2E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution."
},
{
"lang": "es",
"value": "El servidor HTTP Apache, en todas las distribuciones anteriores a la 2.2.32 y la 2.4.25 era liberal en el espacio en blanco aceptado de peticiones y enviado en lineas y cabeceras de respuesta. La aceptaci\u00f3n de estos comportamientos diferentes representaba un problema a nivel de seguridad cuando httpd participa en cualquier cadena de proxies o interact\u00faa con servidores de aplicaciones backend, ya sea mediante mod_proxy o utilizando mecanismos CGI convencionales y puede dar lugar al tr\u00e1fico de peticiones, divisi\u00f3n de respuestas y contaminaci\u00f3n de la cach\u00e9."
}
],
"id": "CVE-2016-8743",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-07-27T21:29:00.287",
"references": [
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95077"
},
{
"source": "security@apache.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"tags": [
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/HT208221"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95077"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1721"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbmu03753en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/HT208221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/tns-2017-04"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.